From 815dda7dab9f80f08be47dab32c05a21848a506d Mon Sep 17 00:00:00 2001 From: team-tf-cdk <84392119+team-tf-cdk@users.noreply.github.com> Date: Wed, 20 Nov 2024 05:01:15 +0100 Subject: [PATCH] feat: upgrade provider from `4.4.0` to version `4.5.0` (#725) This PR upgrades the underlying Terraform provider to version 4.5.0 --------- Signed-off-by: team-tf-cdk --- README.md | 6 +- docs/adSecretBackend.csharp.md | 76 +- docs/adSecretBackend.go.md | 76 +- docs/adSecretBackend.java.md | 148 +-- docs/adSecretBackend.python.md | 148 +-- docs/adSecretBackend.typescript.md | 76 +- docs/adSecretLibrary.csharp.md | 22 +- docs/adSecretLibrary.go.md | 22 +- docs/adSecretLibrary.java.md | 40 +- docs/adSecretLibrary.python.md | 40 +- docs/adSecretLibrary.typescript.md | 22 +- docs/adSecretRole.csharp.md | 18 +- docs/adSecretRole.go.md | 18 +- docs/adSecretRole.java.md | 32 +- docs/adSecretRole.python.md | 32 +- docs/adSecretRole.typescript.md | 18 +- docs/alicloudAuthBackendRole.csharp.md | 34 +- docs/alicloudAuthBackendRole.go.md | 34 +- docs/alicloudAuthBackendRole.java.md | 64 +- docs/alicloudAuthBackendRole.python.md | 64 +- docs/alicloudAuthBackendRole.typescript.md | 34 +- docs/approleAuthBackendLogin.csharp.md | 16 +- docs/approleAuthBackendLogin.go.md | 16 +- docs/approleAuthBackendLogin.java.md | 28 +- docs/approleAuthBackendLogin.python.md | 28 +- docs/approleAuthBackendLogin.typescript.md | 16 +- docs/approleAuthBackendRole.csharp.md | 42 +- docs/approleAuthBackendRole.go.md | 42 +- docs/approleAuthBackendRole.java.md | 80 +- docs/approleAuthBackendRole.python.md | 80 +- docs/approleAuthBackendRole.typescript.md | 42 +- docs/approleAuthBackendRoleSecretId.csharp.md | 114 +- docs/approleAuthBackendRoleSecretId.go.md | 114 +- docs/approleAuthBackendRoleSecretId.java.md | 158 ++- docs/approleAuthBackendRoleSecretId.python.md | 158 ++- ...proleAuthBackendRoleSecretId.typescript.md | 112 +- docs/audit.csharp.md | 20 +- docs/audit.go.md | 20 +- docs/audit.java.md | 36 +- docs/audit.python.md | 36 +- docs/audit.typescript.md | 20 +- docs/auditRequestHeader.csharp.md | 14 +- docs/auditRequestHeader.go.md | 14 +- docs/auditRequestHeader.java.md | 24 +- docs/auditRequestHeader.python.md | 24 +- docs/auditRequestHeader.typescript.md | 14 +- docs/authBackend.csharp.md | 58 +- docs/authBackend.go.md | 58 +- docs/authBackend.java.md | 80 +- docs/authBackend.python.md | 80 +- docs/authBackend.typescript.md | 58 +- docs/awsAuthBackendCert.csharp.md | 18 +- docs/awsAuthBackendCert.go.md | 18 +- docs/awsAuthBackendCert.java.md | 32 +- docs/awsAuthBackendCert.python.md | 32 +- docs/awsAuthBackendCert.typescript.md | 18 +- docs/awsAuthBackendClient.csharp.md | 36 +- docs/awsAuthBackendClient.go.md | 36 +- docs/awsAuthBackendClient.java.md | 68 +- docs/awsAuthBackendClient.python.md | 68 +- docs/awsAuthBackendClient.typescript.md | 36 +- docs/awsAuthBackendConfigIdentity.csharp.md | 20 +- docs/awsAuthBackendConfigIdentity.go.md | 20 +- docs/awsAuthBackendConfigIdentity.java.md | 36 +- docs/awsAuthBackendConfigIdentity.python.md | 36 +- ...awsAuthBackendConfigIdentity.typescript.md | 20 +- .../awsAuthBackendIdentityWhitelist.csharp.md | 16 +- docs/awsAuthBackendIdentityWhitelist.go.md | 16 +- docs/awsAuthBackendIdentityWhitelist.java.md | 28 +- .../awsAuthBackendIdentityWhitelist.python.md | 28 +- ...AuthBackendIdentityWhitelist.typescript.md | 16 +- docs/awsAuthBackendLogin.csharp.md | 30 +- docs/awsAuthBackendLogin.go.md | 30 +- docs/awsAuthBackendLogin.java.md | 56 +- docs/awsAuthBackendLogin.python.md | 56 +- docs/awsAuthBackendLogin.typescript.md | 30 +- docs/awsAuthBackendRole.csharp.md | 64 +- docs/awsAuthBackendRole.go.md | 64 +- docs/awsAuthBackendRole.java.md | 124 +- docs/awsAuthBackendRole.python.md | 124 +- docs/awsAuthBackendRole.typescript.md | 64 +- docs/awsAuthBackendRoleTag.csharp.md | 24 +- docs/awsAuthBackendRoleTag.go.md | 24 +- docs/awsAuthBackendRoleTag.java.md | 44 +- docs/awsAuthBackendRoleTag.python.md | 44 +- docs/awsAuthBackendRoleTag.typescript.md | 24 +- docs/awsAuthBackendRoletagBlacklist.csharp.md | 16 +- docs/awsAuthBackendRoletagBlacklist.go.md | 16 +- docs/awsAuthBackendRoletagBlacklist.java.md | 28 +- docs/awsAuthBackendRoletagBlacklist.python.md | 28 +- ...sAuthBackendRoletagBlacklist.typescript.md | 16 +- docs/awsAuthBackendStsRole.csharp.md | 16 +- docs/awsAuthBackendStsRole.go.md | 16 +- docs/awsAuthBackendStsRole.java.md | 28 +- docs/awsAuthBackendStsRole.python.md | 28 +- docs/awsAuthBackendStsRole.typescript.md | 16 +- docs/awsSecretBackend.csharp.md | 42 +- docs/awsSecretBackend.go.md | 42 +- docs/awsSecretBackend.java.md | 80 +- docs/awsSecretBackend.python.md | 80 +- docs/awsSecretBackend.typescript.md | 42 +- docs/awsSecretBackendRole.csharp.md | 38 +- docs/awsSecretBackendRole.go.md | 38 +- docs/awsSecretBackendRole.java.md | 72 +- docs/awsSecretBackendRole.python.md | 72 +- docs/awsSecretBackendRole.typescript.md | 38 +- docs/awsSecretBackendStaticRole.csharp.md | 18 +- docs/awsSecretBackendStaticRole.go.md | 18 +- docs/awsSecretBackendStaticRole.java.md | 32 +- docs/awsSecretBackendStaticRole.python.md | 32 +- docs/awsSecretBackendStaticRole.typescript.md | 18 +- docs/azureAuthBackendConfig.csharp.md | 26 +- docs/azureAuthBackendConfig.go.md | 26 +- docs/azureAuthBackendConfig.java.md | 48 +- docs/azureAuthBackendConfig.python.md | 48 +- docs/azureAuthBackendConfig.typescript.md | 26 +- docs/azureAuthBackendRole.csharp.md | 44 +- docs/azureAuthBackendRole.go.md | 44 +- docs/azureAuthBackendRole.java.md | 84 +- docs/azureAuthBackendRole.python.md | 84 +- docs/azureAuthBackendRole.typescript.md | 44 +- docs/azureSecretBackend.csharp.md | 34 +- docs/azureSecretBackend.go.md | 34 +- docs/azureSecretBackend.java.md | 64 +- docs/azureSecretBackend.python.md | 64 +- docs/azureSecretBackend.typescript.md | 34 +- docs/azureSecretBackendRole.csharp.md | 48 +- docs/azureSecretBackendRole.go.md | 48 +- docs/azureSecretBackendRole.java.md | 76 +- docs/azureSecretBackendRole.python.md | 76 +- docs/azureSecretBackendRole.typescript.md | 48 +- docs/certAuthBackendRole.csharp.md | 82 +- docs/certAuthBackendRole.go.md | 82 +- docs/certAuthBackendRole.java.md | 160 +-- docs/certAuthBackendRole.python.md | 160 +-- docs/certAuthBackendRole.typescript.md | 82 +- docs/configUiCustomMessage.csharp.md | 26 +- docs/configUiCustomMessage.go.md | 26 +- docs/configUiCustomMessage.java.md | 44 +- docs/configUiCustomMessage.python.md | 48 +- docs/configUiCustomMessage.typescript.md | 26 +- docs/consulSecretBackend.csharp.md | 36 +- docs/consulSecretBackend.go.md | 36 +- docs/consulSecretBackend.java.md | 68 +- docs/consulSecretBackend.python.md | 68 +- docs/consulSecretBackend.typescript.md | 36 +- docs/consulSecretBackendRole.csharp.md | 34 +- docs/consulSecretBackendRole.go.md | 34 +- docs/consulSecretBackendRole.java.md | 64 +- docs/consulSecretBackendRole.python.md | 64 +- docs/consulSecretBackendRole.typescript.md | 34 +- docs/dataVaultAdAccessCredentials.csharp.md | 14 +- docs/dataVaultAdAccessCredentials.go.md | 14 +- docs/dataVaultAdAccessCredentials.java.md | 24 +- docs/dataVaultAdAccessCredentials.python.md | 24 +- ...dataVaultAdAccessCredentials.typescript.md | 14 +- ...ataVaultApproleAuthBackendRoleId.csharp.md | 14 +- docs/dataVaultApproleAuthBackendRoleId.go.md | 14 +- .../dataVaultApproleAuthBackendRoleId.java.md | 24 +- ...ataVaultApproleAuthBackendRoleId.python.md | 24 +- ...aultApproleAuthBackendRoleId.typescript.md | 14 +- docs/dataVaultAuthBackend.csharp.md | 12 +- docs/dataVaultAuthBackend.go.md | 12 +- docs/dataVaultAuthBackend.java.md | 20 +- docs/dataVaultAuthBackend.python.md | 20 +- docs/dataVaultAuthBackend.typescript.md | 12 +- docs/dataVaultAuthBackends.csharp.md | 12 +- docs/dataVaultAuthBackends.go.md | 12 +- docs/dataVaultAuthBackends.java.md | 20 +- docs/dataVaultAuthBackends.python.md | 20 +- docs/dataVaultAuthBackends.typescript.md | 12 +- docs/dataVaultAwsAccessCredentials.csharp.md | 22 +- docs/dataVaultAwsAccessCredentials.go.md | 22 +- docs/dataVaultAwsAccessCredentials.java.md | 40 +- docs/dataVaultAwsAccessCredentials.python.md | 40 +- ...ataVaultAwsAccessCredentials.typescript.md | 22 +- ...aVaultAwsStaticAccessCredentials.csharp.md | 14 +- .../dataVaultAwsStaticAccessCredentials.go.md | 14 +- ...ataVaultAwsStaticAccessCredentials.java.md | 24 +- ...aVaultAwsStaticAccessCredentials.python.md | 24 +- ...ltAwsStaticAccessCredentials.typescript.md | 14 +- .../dataVaultAzureAccessCredentials.csharp.md | 28 +- docs/dataVaultAzureAccessCredentials.go.md | 28 +- docs/dataVaultAzureAccessCredentials.java.md | 52 +- .../dataVaultAzureAccessCredentials.python.md | 52 +- ...aVaultAzureAccessCredentials.typescript.md | 28 +- docs/dataVaultGcpAuthBackendRole.csharp.md | 32 +- docs/dataVaultGcpAuthBackendRole.go.md | 32 +- docs/dataVaultGcpAuthBackendRole.java.md | 60 +- docs/dataVaultGcpAuthBackendRole.python.md | 60 +- .../dataVaultGcpAuthBackendRole.typescript.md | 32 +- docs/dataVaultGenericSecret.csharp.md | 18 +- docs/dataVaultGenericSecret.go.md | 18 +- docs/dataVaultGenericSecret.java.md | 32 +- docs/dataVaultGenericSecret.python.md | 32 +- docs/dataVaultGenericSecret.typescript.md | 18 +- docs/dataVaultIdentityEntity.csharp.md | 20 +- docs/dataVaultIdentityEntity.go.md | 20 +- docs/dataVaultIdentityEntity.java.md | 36 +- docs/dataVaultIdentityEntity.python.md | 36 +- docs/dataVaultIdentityEntity.typescript.md | 20 +- docs/dataVaultIdentityGroup.csharp.md | 20 +- docs/dataVaultIdentityGroup.go.md | 20 +- docs/dataVaultIdentityGroup.java.md | 36 +- docs/dataVaultIdentityGroup.python.md | 36 +- docs/dataVaultIdentityGroup.typescript.md | 20 +- ...dataVaultIdentityOidcClientCreds.csharp.md | 12 +- docs/dataVaultIdentityOidcClientCreds.go.md | 12 +- docs/dataVaultIdentityOidcClientCreds.java.md | 20 +- ...dataVaultIdentityOidcClientCreds.python.md | 20 +- ...VaultIdentityOidcClientCreds.typescript.md | 12 +- ...ataVaultIdentityOidcOpenidConfig.csharp.md | 12 +- docs/dataVaultIdentityOidcOpenidConfig.go.md | 12 +- .../dataVaultIdentityOidcOpenidConfig.java.md | 20 +- ...ataVaultIdentityOidcOpenidConfig.python.md | 20 +- ...aultIdentityOidcOpenidConfig.typescript.md | 12 +- .../dataVaultIdentityOidcPublicKeys.csharp.md | 12 +- docs/dataVaultIdentityOidcPublicKeys.go.md | 12 +- docs/dataVaultIdentityOidcPublicKeys.java.md | 20 +- .../dataVaultIdentityOidcPublicKeys.python.md | 20 +- ...aVaultIdentityOidcPublicKeys.typescript.md | 12 +- ...VaultKubernetesAuthBackendConfig.csharp.md | 71 +- ...dataVaultKubernetesAuthBackendConfig.go.md | 69 +- ...taVaultKubernetesAuthBackendConfig.java.md | 103 +- ...VaultKubernetesAuthBackendConfig.python.md | 105 +- ...tKubernetesAuthBackendConfig.typescript.md | 68 +- ...taVaultKubernetesAuthBackendRole.csharp.md | 34 +- docs/dataVaultKubernetesAuthBackendRole.go.md | 34 +- ...dataVaultKubernetesAuthBackendRole.java.md | 64 +- ...taVaultKubernetesAuthBackendRole.python.md | 64 +- ...ultKubernetesAuthBackendRole.typescript.md | 34 +- ...ultKubernetesServiceAccountToken.csharp.md | 20 +- ...taVaultKubernetesServiceAccountToken.go.md | 20 +- ...VaultKubernetesServiceAccountToken.java.md | 36 +- ...ultKubernetesServiceAccountToken.python.md | 36 +- ...ubernetesServiceAccountToken.typescript.md | 20 +- docs/dataVaultKvSecret.csharp.md | 12 +- docs/dataVaultKvSecret.go.md | 12 +- docs/dataVaultKvSecret.java.md | 20 +- docs/dataVaultKvSecret.python.md | 20 +- docs/dataVaultKvSecret.typescript.md | 12 +- docs/dataVaultKvSecretSubkeysV2.csharp.md | 18 +- docs/dataVaultKvSecretSubkeysV2.go.md | 18 +- docs/dataVaultKvSecretSubkeysV2.java.md | 32 +- docs/dataVaultKvSecretSubkeysV2.python.md | 32 +- docs/dataVaultKvSecretSubkeysV2.typescript.md | 18 +- docs/dataVaultKvSecretV2.csharp.md | 16 +- docs/dataVaultKvSecretV2.go.md | 16 +- docs/dataVaultKvSecretV2.java.md | 28 +- docs/dataVaultKvSecretV2.python.md | 28 +- docs/dataVaultKvSecretV2.typescript.md | 16 +- docs/dataVaultKvSecretsList.csharp.md | 12 +- docs/dataVaultKvSecretsList.go.md | 12 +- docs/dataVaultKvSecretsList.java.md | 20 +- docs/dataVaultKvSecretsList.python.md | 20 +- docs/dataVaultKvSecretsList.typescript.md | 12 +- docs/dataVaultKvSecretsListV2.csharp.md | 14 +- docs/dataVaultKvSecretsListV2.go.md | 14 +- docs/dataVaultKvSecretsListV2.java.md | 24 +- docs/dataVaultKvSecretsListV2.python.md | 24 +- docs/dataVaultKvSecretsListV2.typescript.md | 14 +- .../dataVaultLdapDynamicCredentials.csharp.md | 14 +- docs/dataVaultLdapDynamicCredentials.go.md | 14 +- docs/dataVaultLdapDynamicCredentials.java.md | 24 +- .../dataVaultLdapDynamicCredentials.python.md | 24 +- ...aVaultLdapDynamicCredentials.typescript.md | 14 +- docs/dataVaultLdapStaticCredentials.csharp.md | 14 +- docs/dataVaultLdapStaticCredentials.go.md | 14 +- docs/dataVaultLdapStaticCredentials.java.md | 24 +- docs/dataVaultLdapStaticCredentials.python.md | 24 +- ...taVaultLdapStaticCredentials.typescript.md | 14 +- docs/dataVaultNamespace.csharp.md | 12 +- docs/dataVaultNamespace.go.md | 12 +- docs/dataVaultNamespace.java.md | 20 +- docs/dataVaultNamespace.python.md | 20 +- docs/dataVaultNamespace.typescript.md | 12 +- docs/dataVaultNamespaces.csharp.md | 10 +- docs/dataVaultNamespaces.go.md | 10 +- docs/dataVaultNamespaces.java.md | 16 +- docs/dataVaultNamespaces.python.md | 16 +- docs/dataVaultNamespaces.typescript.md | 10 +- docs/dataVaultNomadAccessToken.csharp.md | 14 +- docs/dataVaultNomadAccessToken.go.md | 14 +- docs/dataVaultNomadAccessToken.java.md | 24 +- docs/dataVaultNomadAccessToken.python.md | 24 +- docs/dataVaultNomadAccessToken.typescript.md | 14 +- ...taVaultPkiSecretBackendConfigEst.csharp.md | 12 +- docs/dataVaultPkiSecretBackendConfigEst.go.md | 12 +- ...dataVaultPkiSecretBackendConfigEst.java.md | 20 +- ...taVaultPkiSecretBackendConfigEst.python.md | 20 +- ...ultPkiSecretBackendConfigEst.typescript.md | 12 +- .../dataVaultPkiSecretBackendIssuer.csharp.md | 14 +- docs/dataVaultPkiSecretBackendIssuer.go.md | 14 +- docs/dataVaultPkiSecretBackendIssuer.java.md | 24 +- .../dataVaultPkiSecretBackendIssuer.python.md | 24 +- ...aVaultPkiSecretBackendIssuer.typescript.md | 14 +- ...dataVaultPkiSecretBackendIssuers.csharp.md | 12 +- docs/dataVaultPkiSecretBackendIssuers.go.md | 12 +- docs/dataVaultPkiSecretBackendIssuers.java.md | 20 +- ...dataVaultPkiSecretBackendIssuers.python.md | 20 +- ...VaultPkiSecretBackendIssuers.typescript.md | 12 +- docs/dataVaultPkiSecretBackendKey.csharp.md | 14 +- docs/dataVaultPkiSecretBackendKey.go.md | 14 +- docs/dataVaultPkiSecretBackendKey.java.md | 24 +- docs/dataVaultPkiSecretBackendKey.python.md | 24 +- ...dataVaultPkiSecretBackendKey.typescript.md | 14 +- docs/dataVaultPkiSecretBackendKeys.csharp.md | 12 +- docs/dataVaultPkiSecretBackendKeys.go.md | 12 +- docs/dataVaultPkiSecretBackendKeys.java.md | 20 +- docs/dataVaultPkiSecretBackendKeys.python.md | 20 +- ...ataVaultPkiSecretBackendKeys.typescript.md | 12 +- docs/dataVaultPolicyDocument.csharp.md | 56 +- docs/dataVaultPolicyDocument.go.md | 56 +- docs/dataVaultPolicyDocument.java.md | 64 +- docs/dataVaultPolicyDocument.python.md | 64 +- docs/dataVaultPolicyDocument.typescript.md | 56 +- docs/dataVaultRaftAutopilotState.csharp.md | 10 +- docs/dataVaultRaftAutopilotState.go.md | 10 +- docs/dataVaultRaftAutopilotState.java.md | 16 +- docs/dataVaultRaftAutopilotState.python.md | 16 +- .../dataVaultRaftAutopilotState.typescript.md | 10 +- docs/dataVaultTransformDecode.csharp.md | 26 +- docs/dataVaultTransformDecode.go.md | 26 +- docs/dataVaultTransformDecode.java.md | 48 +- docs/dataVaultTransformDecode.python.md | 48 +- docs/dataVaultTransformDecode.typescript.md | 26 +- docs/dataVaultTransformEncode.csharp.md | 26 +- docs/dataVaultTransformEncode.go.md | 26 +- docs/dataVaultTransformEncode.java.md | 48 +- docs/dataVaultTransformEncode.python.md | 48 +- docs/dataVaultTransformEncode.typescript.md | 26 +- docs/dataVaultTransitDecrypt.csharp.md | 18 +- docs/dataVaultTransitDecrypt.go.md | 18 +- docs/dataVaultTransitDecrypt.java.md | 32 +- docs/dataVaultTransitDecrypt.python.md | 32 +- docs/dataVaultTransitDecrypt.typescript.md | 18 +- docs/dataVaultTransitEncrypt.csharp.md | 20 +- docs/dataVaultTransitEncrypt.go.md | 20 +- docs/dataVaultTransitEncrypt.java.md | 36 +- docs/dataVaultTransitEncrypt.python.md | 36 +- docs/dataVaultTransitEncrypt.typescript.md | 20 +- .../databaseSecretBackendConnection.csharp.md | 593 +++++++--- docs/databaseSecretBackendConnection.go.md | 593 +++++++--- docs/databaseSecretBackendConnection.java.md | 651 +++++++---- .../databaseSecretBackendConnection.python.md | 1012 +++++++++++------ ...abaseSecretBackendConnection.typescript.md | 588 +++++++--- docs/databaseSecretBackendRole.csharp.md | 32 +- docs/databaseSecretBackendRole.go.md | 32 +- docs/databaseSecretBackendRole.java.md | 60 +- docs/databaseSecretBackendRole.python.md | 60 +- docs/databaseSecretBackendRole.typescript.md | 32 +- .../databaseSecretBackendStaticRole.csharp.md | 75 +- docs/databaseSecretBackendStaticRole.go.md | 73 +- docs/databaseSecretBackendStaticRole.java.md | 109 +- .../databaseSecretBackendStaticRole.python.md | 113 +- ...abaseSecretBackendStaticRole.typescript.md | 72 +- docs/databaseSecretsMount.csharp.md | 829 +++++++++----- docs/databaseSecretsMount.go.md | 829 +++++++++----- docs/databaseSecretsMount.java.md | 907 +++++++++------ docs/databaseSecretsMount.python.md | 905 +++++++++------ docs/databaseSecretsMount.typescript.md | 824 +++++++++----- docs/egpPolicy.csharp.md | 18 +- docs/egpPolicy.go.md | 18 +- docs/egpPolicy.java.md | 32 +- docs/egpPolicy.python.md | 32 +- docs/egpPolicy.typescript.md | 18 +- docs/gcpAuthBackend.csharp.md | 96 +- docs/gcpAuthBackend.go.md | 96 +- docs/gcpAuthBackend.java.md | 148 +-- docs/gcpAuthBackend.python.md | 156 +-- docs/gcpAuthBackend.typescript.md | 96 +- docs/gcpAuthBackendRole.csharp.md | 76 +- docs/gcpAuthBackendRole.go.md | 76 +- docs/gcpAuthBackendRole.java.md | 148 +-- docs/gcpAuthBackendRole.python.md | 148 +-- docs/gcpAuthBackendRole.typescript.md | 76 +- docs/gcpSecretBackend.csharp.md | 32 +- docs/gcpSecretBackend.go.md | 32 +- docs/gcpSecretBackend.java.md | 60 +- docs/gcpSecretBackend.python.md | 60 +- docs/gcpSecretBackend.typescript.md | 32 +- docs/gcpSecretImpersonatedAccount.csharp.md | 65 +- docs/gcpSecretImpersonatedAccount.go.md | 63 +- docs/gcpSecretImpersonatedAccount.java.md | 89 +- docs/gcpSecretImpersonatedAccount.python.md | 93 +- ...gcpSecretImpersonatedAccount.typescript.md | 62 +- docs/gcpSecretRoleset.csharp.md | 26 +- docs/gcpSecretRoleset.go.md | 26 +- docs/gcpSecretRoleset.java.md | 44 +- docs/gcpSecretRoleset.python.md | 44 +- docs/gcpSecretRoleset.typescript.md | 26 +- docs/gcpSecretStaticAccount.csharp.md | 26 +- docs/gcpSecretStaticAccount.go.md | 26 +- docs/gcpSecretStaticAccount.java.md | 44 +- docs/gcpSecretStaticAccount.python.md | 44 +- docs/gcpSecretStaticAccount.typescript.md | 26 +- docs/genericEndpoint.csharp.md | 22 +- docs/genericEndpoint.go.md | 22 +- docs/genericEndpoint.java.md | 40 +- docs/genericEndpoint.python.md | 40 +- docs/genericEndpoint.typescript.md | 22 +- docs/genericSecret.csharp.md | 18 +- docs/genericSecret.go.md | 18 +- docs/genericSecret.java.md | 32 +- docs/genericSecret.python.md | 32 +- docs/genericSecret.typescript.md | 18 +- docs/githubAuthBackend.csharp.md | 76 +- docs/githubAuthBackend.go.md | 76 +- docs/githubAuthBackend.java.md | 116 +- docs/githubAuthBackend.python.md | 116 +- docs/githubAuthBackend.typescript.md | 76 +- docs/githubTeam.csharp.md | 16 +- docs/githubTeam.go.md | 16 +- docs/githubTeam.java.md | 28 +- docs/githubTeam.python.md | 28 +- docs/githubTeam.typescript.md | 16 +- docs/githubUser.csharp.md | 16 +- docs/githubUser.go.md | 16 +- docs/githubUser.java.md | 28 +- docs/githubUser.python.md | 28 +- docs/githubUser.typescript.md | 16 +- docs/identityEntity.csharp.md | 20 +- docs/identityEntity.go.md | 20 +- docs/identityEntity.java.md | 36 +- docs/identityEntity.python.md | 36 +- docs/identityEntity.typescript.md | 20 +- docs/identityEntityAlias.csharp.md | 18 +- docs/identityEntityAlias.go.md | 18 +- docs/identityEntityAlias.java.md | 32 +- docs/identityEntityAlias.python.md | 32 +- docs/identityEntityAlias.typescript.md | 18 +- docs/identityEntityPolicies.csharp.md | 16 +- docs/identityEntityPolicies.go.md | 16 +- docs/identityEntityPolicies.java.md | 28 +- docs/identityEntityPolicies.python.md | 28 +- docs/identityEntityPolicies.typescript.md | 16 +- docs/identityGroup.csharp.md | 28 +- docs/identityGroup.go.md | 28 +- docs/identityGroup.java.md | 52 +- docs/identityGroup.python.md | 52 +- docs/identityGroup.typescript.md | 28 +- docs/identityGroupAlias.csharp.md | 16 +- docs/identityGroupAlias.go.md | 16 +- docs/identityGroupAlias.java.md | 28 +- docs/identityGroupAlias.python.md | 28 +- docs/identityGroupAlias.typescript.md | 16 +- docs/identityGroupMemberEntityIds.csharp.md | 16 +- docs/identityGroupMemberEntityIds.go.md | 16 +- docs/identityGroupMemberEntityIds.java.md | 28 +- docs/identityGroupMemberEntityIds.python.md | 28 +- ...identityGroupMemberEntityIds.typescript.md | 16 +- docs/identityGroupMemberGroupIds.csharp.md | 16 +- docs/identityGroupMemberGroupIds.go.md | 16 +- docs/identityGroupMemberGroupIds.java.md | 28 +- docs/identityGroupMemberGroupIds.python.md | 28 +- .../identityGroupMemberGroupIds.typescript.md | 16 +- docs/identityGroupPolicies.csharp.md | 16 +- docs/identityGroupPolicies.go.md | 16 +- docs/identityGroupPolicies.java.md | 28 +- docs/identityGroupPolicies.python.md | 28 +- docs/identityGroupPolicies.typescript.md | 16 +- docs/identityMfaDuo.csharp.md | 22 +- docs/identityMfaDuo.go.md | 22 +- docs/identityMfaDuo.java.md | 40 +- docs/identityMfaDuo.python.md | 40 +- docs/identityMfaDuo.typescript.md | 22 +- docs/identityMfaLoginEnforcement.csharp.md | 22 +- docs/identityMfaLoginEnforcement.go.md | 22 +- docs/identityMfaLoginEnforcement.java.md | 40 +- docs/identityMfaLoginEnforcement.python.md | 40 +- .../identityMfaLoginEnforcement.typescript.md | 22 +- docs/identityMfaOkta.csharp.md | 20 +- docs/identityMfaOkta.go.md | 20 +- docs/identityMfaOkta.java.md | 36 +- docs/identityMfaOkta.python.md | 36 +- docs/identityMfaOkta.typescript.md | 20 +- docs/identityMfaPingid.csharp.md | 14 +- docs/identityMfaPingid.go.md | 14 +- docs/identityMfaPingid.java.md | 24 +- docs/identityMfaPingid.python.md | 24 +- docs/identityMfaPingid.typescript.md | 14 +- docs/identityMfaTotp.csharp.md | 26 +- docs/identityMfaTotp.go.md | 26 +- docs/identityMfaTotp.java.md | 48 +- docs/identityMfaTotp.python.md | 48 +- docs/identityMfaTotp.typescript.md | 26 +- docs/identityOidc.csharp.md | 12 +- docs/identityOidc.go.md | 12 +- docs/identityOidc.java.md | 20 +- docs/identityOidc.python.md | 20 +- docs/identityOidc.typescript.md | 12 +- docs/identityOidcAssignment.csharp.md | 16 +- docs/identityOidcAssignment.go.md | 16 +- docs/identityOidcAssignment.java.md | 28 +- docs/identityOidcAssignment.python.md | 28 +- docs/identityOidcAssignment.typescript.md | 16 +- docs/identityOidcClient.csharp.md | 24 +- docs/identityOidcClient.go.md | 24 +- docs/identityOidcClient.java.md | 44 +- docs/identityOidcClient.python.md | 44 +- docs/identityOidcClient.typescript.md | 24 +- docs/identityOidcKey.csharp.md | 20 +- docs/identityOidcKey.go.md | 20 +- docs/identityOidcKey.java.md | 36 +- docs/identityOidcKey.python.md | 36 +- docs/identityOidcKey.typescript.md | 20 +- docs/identityOidcKeyAllowedClientId.csharp.md | 14 +- docs/identityOidcKeyAllowedClientId.go.md | 14 +- docs/identityOidcKeyAllowedClientId.java.md | 24 +- docs/identityOidcKeyAllowedClientId.python.md | 24 +- ...entityOidcKeyAllowedClientId.typescript.md | 14 +- docs/identityOidcProvider.csharp.md | 20 +- docs/identityOidcProvider.go.md | 20 +- docs/identityOidcProvider.java.md | 36 +- docs/identityOidcProvider.python.md | 36 +- docs/identityOidcProvider.typescript.md | 20 +- docs/identityOidcRole.csharp.md | 20 +- docs/identityOidcRole.go.md | 20 +- docs/identityOidcRole.java.md | 36 +- docs/identityOidcRole.python.md | 36 +- docs/identityOidcRole.typescript.md | 20 +- docs/identityOidcScope.csharp.md | 16 +- docs/identityOidcScope.go.md | 16 +- docs/identityOidcScope.java.md | 28 +- docs/identityOidcScope.python.md | 28 +- docs/identityOidcScope.typescript.md | 16 +- docs/jwtAuthBackend.csharp.md | 84 +- docs/jwtAuthBackend.go.md | 84 +- docs/jwtAuthBackend.java.md | 132 +-- docs/jwtAuthBackend.python.md | 132 +-- docs/jwtAuthBackend.typescript.md | 84 +- docs/jwtAuthBackendRole.csharp.md | 66 +- docs/jwtAuthBackendRole.go.md | 66 +- docs/jwtAuthBackendRole.java.md | 128 +-- docs/jwtAuthBackendRole.python.md | 128 +-- docs/jwtAuthBackendRole.typescript.md | 66 +- docs/kmipSecretBackend.csharp.md | 34 +- docs/kmipSecretBackend.go.md | 34 +- docs/kmipSecretBackend.java.md | 64 +- docs/kmipSecretBackend.python.md | 64 +- docs/kmipSecretBackend.typescript.md | 34 +- docs/kmipSecretRole.csharp.md | 50 +- docs/kmipSecretRole.go.md | 50 +- docs/kmipSecretRole.java.md | 96 +- docs/kmipSecretRole.python.md | 96 +- docs/kmipSecretRole.typescript.md | 50 +- docs/kmipSecretScope.csharp.md | 16 +- docs/kmipSecretScope.go.md | 16 +- docs/kmipSecretScope.java.md | 28 +- docs/kmipSecretScope.python.md | 28 +- docs/kmipSecretScope.typescript.md | 16 +- docs/kubernetesAuthBackendConfig.csharp.md | 73 +- docs/kubernetesAuthBackendConfig.go.md | 71 +- docs/kubernetesAuthBackendConfig.java.md | 107 +- docs/kubernetesAuthBackendConfig.python.md | 109 +- .../kubernetesAuthBackendConfig.typescript.md | 70 +- docs/kubernetesAuthBackendRole.csharp.md | 40 +- docs/kubernetesAuthBackendRole.go.md | 40 +- docs/kubernetesAuthBackendRole.java.md | 76 +- docs/kubernetesAuthBackendRole.python.md | 76 +- docs/kubernetesAuthBackendRole.typescript.md | 40 +- docs/kubernetesSecretBackend.csharp.md | 52 +- docs/kubernetesSecretBackend.go.md | 52 +- docs/kubernetesSecretBackend.java.md | 100 +- docs/kubernetesSecretBackend.python.md | 100 +- docs/kubernetesSecretBackend.typescript.md | 52 +- docs/kubernetesSecretBackendRole.csharp.md | 36 +- docs/kubernetesSecretBackendRole.go.md | 36 +- docs/kubernetesSecretBackendRole.java.md | 68 +- docs/kubernetesSecretBackendRole.python.md | 68 +- .../kubernetesSecretBackendRole.typescript.md | 36 +- docs/kvSecret.csharp.md | 14 +- docs/kvSecret.go.md | 14 +- docs/kvSecret.java.md | 24 +- docs/kvSecret.python.md | 24 +- docs/kvSecret.typescript.md | 14 +- docs/kvSecretBackendV2.csharp.md | 18 +- docs/kvSecretBackendV2.go.md | 18 +- docs/kvSecretBackendV2.java.md | 32 +- docs/kvSecretBackendV2.python.md | 32 +- docs/kvSecretBackendV2.typescript.md | 18 +- docs/kvSecretV2.csharp.md | 34 +- docs/kvSecretV2.go.md | 34 +- docs/kvSecretV2.java.md | 56 +- docs/kvSecretV2.python.md | 64 +- docs/kvSecretV2.typescript.md | 34 +- docs/ldapAuthBackend.csharp.md | 173 +-- docs/ldapAuthBackend.go.md | 173 +-- docs/ldapAuthBackend.java.md | 309 ++--- docs/ldapAuthBackend.python.md | 309 ++--- docs/ldapAuthBackend.typescript.md | 172 +-- docs/ldapAuthBackendGroup.csharp.md | 22 +- docs/ldapAuthBackendGroup.go.md | 22 +- docs/ldapAuthBackendGroup.java.md | 40 +- docs/ldapAuthBackendGroup.python.md | 40 +- docs/ldapAuthBackendGroup.typescript.md | 22 +- docs/ldapAuthBackendUser.csharp.md | 26 +- docs/ldapAuthBackendUser.go.md | 26 +- docs/ldapAuthBackendUser.java.md | 48 +- docs/ldapAuthBackendUser.python.md | 48 +- docs/ldapAuthBackendUser.typescript.md | 26 +- docs/ldapSecretBackend.csharp.md | 78 +- docs/ldapSecretBackend.go.md | 78 +- docs/ldapSecretBackend.java.md | 152 +-- docs/ldapSecretBackend.python.md | 152 +-- docs/ldapSecretBackend.typescript.md | 78 +- docs/ldapSecretBackendDynamicRole.csharp.md | 26 +- docs/ldapSecretBackendDynamicRole.go.md | 26 +- docs/ldapSecretBackendDynamicRole.java.md | 48 +- docs/ldapSecretBackendDynamicRole.python.md | 48 +- ...ldapSecretBackendDynamicRole.typescript.md | 26 +- docs/ldapSecretBackendLibrarySet.csharp.md | 22 +- docs/ldapSecretBackendLibrarySet.go.md | 22 +- docs/ldapSecretBackendLibrarySet.java.md | 40 +- docs/ldapSecretBackendLibrarySet.python.md | 40 +- .../ldapSecretBackendLibrarySet.typescript.md | 22 +- docs/ldapSecretBackendStaticRole.csharp.md | 22 +- docs/ldapSecretBackendStaticRole.go.md | 22 +- docs/ldapSecretBackendStaticRole.java.md | 40 +- docs/ldapSecretBackendStaticRole.python.md | 40 +- .../ldapSecretBackendStaticRole.typescript.md | 22 +- docs/managedKeys.csharp.md | 100 +- docs/managedKeys.go.md | 100 +- docs/managedKeys.java.md | 112 +- docs/managedKeys.python.md | 112 +- docs/managedKeys.typescript.md | 100 +- docs/mfaDuo.csharp.md | 24 +- docs/mfaDuo.go.md | 24 +- docs/mfaDuo.java.md | 44 +- docs/mfaDuo.python.md | 44 +- docs/mfaDuo.typescript.md | 24 +- docs/mfaOkta.csharp.md | 22 +- docs/mfaOkta.go.md | 22 +- docs/mfaOkta.java.md | 40 +- docs/mfaOkta.python.md | 40 +- docs/mfaOkta.typescript.md | 22 +- docs/mfaPingid.csharp.md | 16 +- docs/mfaPingid.go.md | 16 +- docs/mfaPingid.java.md | 28 +- docs/mfaPingid.python.md | 28 +- docs/mfaPingid.typescript.md | 16 +- docs/mfaTotp.csharp.md | 24 +- docs/mfaTotp.go.md | 24 +- docs/mfaTotp.java.md | 44 +- docs/mfaTotp.python.md | 44 +- docs/mfaTotp.typescript.md | 24 +- docs/mongodbatlasSecretBackend.csharp.md | 16 +- docs/mongodbatlasSecretBackend.go.md | 16 +- docs/mongodbatlasSecretBackend.java.md | 28 +- docs/mongodbatlasSecretBackend.python.md | 28 +- docs/mongodbatlasSecretBackend.typescript.md | 16 +- docs/mongodbatlasSecretRole.csharp.md | 30 +- docs/mongodbatlasSecretRole.go.md | 30 +- docs/mongodbatlasSecretRole.java.md | 56 +- docs/mongodbatlasSecretRole.python.md | 56 +- docs/mongodbatlasSecretRole.typescript.md | 30 +- docs/mount.csharp.md | 46 +- docs/mount.go.md | 46 +- docs/mount.java.md | 88 +- docs/mount.python.md | 88 +- docs/mount.typescript.md | 46 +- docs/namespace.csharp.md | 16 +- docs/namespace.go.md | 16 +- docs/namespace.java.md | 28 +- docs/namespace.python.md | 28 +- docs/namespace.typescript.md | 16 +- docs/nomadSecretBackend.csharp.md | 38 +- docs/nomadSecretBackend.go.md | 38 +- docs/nomadSecretBackend.java.md | 72 +- docs/nomadSecretBackend.python.md | 72 +- docs/nomadSecretBackend.typescript.md | 38 +- docs/nomadSecretRole.csharp.md | 20 +- docs/nomadSecretRole.go.md | 20 +- docs/nomadSecretRole.java.md | 36 +- docs/nomadSecretRole.python.md | 36 +- docs/nomadSecretRole.typescript.md | 20 +- docs/oktaAuthBackend.csharp.md | 74 +- docs/oktaAuthBackend.go.md | 74 +- docs/oktaAuthBackend.java.md | 124 +- docs/oktaAuthBackend.python.md | 124 +- docs/oktaAuthBackend.typescript.md | 74 +- docs/oktaAuthBackendGroup.csharp.md | 16 +- docs/oktaAuthBackendGroup.go.md | 16 +- docs/oktaAuthBackendGroup.java.md | 28 +- docs/oktaAuthBackendGroup.python.md | 28 +- docs/oktaAuthBackendGroup.typescript.md | 16 +- docs/oktaAuthBackendUser.csharp.md | 18 +- docs/oktaAuthBackendUser.go.md | 18 +- docs/oktaAuthBackendUser.java.md | 32 +- docs/oktaAuthBackendUser.python.md | 32 +- docs/oktaAuthBackendUser.typescript.md | 18 +- docs/passwordPolicy.csharp.md | 14 +- docs/passwordPolicy.go.md | 14 +- docs/passwordPolicy.java.md | 24 +- docs/passwordPolicy.python.md | 24 +- docs/passwordPolicy.typescript.md | 14 +- docs/pkiSecretBackendCert.csharp.md | 42 +- docs/pkiSecretBackendCert.go.md | 42 +- docs/pkiSecretBackendCert.java.md | 80 +- docs/pkiSecretBackendCert.python.md | 80 +- docs/pkiSecretBackendCert.typescript.md | 42 +- docs/pkiSecretBackendConfigCa.csharp.md | 14 +- docs/pkiSecretBackendConfigCa.go.md | 14 +- docs/pkiSecretBackendConfigCa.java.md | 24 +- docs/pkiSecretBackendConfigCa.python.md | 24 +- docs/pkiSecretBackendConfigCa.typescript.md | 14 +- docs/pkiSecretBackendConfigCluster.csharp.md | 16 +- docs/pkiSecretBackendConfigCluster.go.md | 16 +- docs/pkiSecretBackendConfigCluster.java.md | 28 +- docs/pkiSecretBackendConfigCluster.python.md | 28 +- ...kiSecretBackendConfigCluster.typescript.md | 16 +- docs/pkiSecretBackendConfigEst.csharp.md | 34 +- docs/pkiSecretBackendConfigEst.go.md | 34 +- docs/pkiSecretBackendConfigEst.java.md | 56 +- docs/pkiSecretBackendConfigEst.python.md | 60 +- docs/pkiSecretBackendConfigEst.typescript.md | 34 +- docs/pkiSecretBackendConfigIssuers.csharp.md | 16 +- docs/pkiSecretBackendConfigIssuers.go.md | 16 +- docs/pkiSecretBackendConfigIssuers.java.md | 28 +- docs/pkiSecretBackendConfigIssuers.python.md | 28 +- ...kiSecretBackendConfigIssuers.typescript.md | 16 +- docs/pkiSecretBackendConfigUrls.csharp.md | 20 +- docs/pkiSecretBackendConfigUrls.go.md | 20 +- docs/pkiSecretBackendConfigUrls.java.md | 36 +- docs/pkiSecretBackendConfigUrls.python.md | 36 +- docs/pkiSecretBackendConfigUrls.typescript.md | 20 +- docs/pkiSecretBackendCrlConfig.csharp.md | 34 +- docs/pkiSecretBackendCrlConfig.go.md | 34 +- docs/pkiSecretBackendCrlConfig.java.md | 64 +- docs/pkiSecretBackendCrlConfig.python.md | 64 +- docs/pkiSecretBackendCrlConfig.typescript.md | 34 +- ...etBackendIntermediateCertRequest.csharp.md | 58 +- ...SecretBackendIntermediateCertRequest.go.md | 58 +- ...cretBackendIntermediateCertRequest.java.md | 112 +- ...etBackendIntermediateCertRequest.python.md | 112 +- ...ckendIntermediateCertRequest.typescript.md | 58 +- ...cretBackendIntermediateSetSigned.csharp.md | 14 +- ...kiSecretBackendIntermediateSetSigned.go.md | 14 +- ...SecretBackendIntermediateSetSigned.java.md | 24 +- ...cretBackendIntermediateSetSigned.python.md | 24 +- ...BackendIntermediateSetSigned.typescript.md | 14 +- docs/pkiSecretBackendIssuer.csharp.md | 32 +- docs/pkiSecretBackendIssuer.go.md | 32 +- docs/pkiSecretBackendIssuer.java.md | 60 +- docs/pkiSecretBackendIssuer.python.md | 60 +- docs/pkiSecretBackendIssuer.typescript.md | 32 +- docs/pkiSecretBackendKey.csharp.md | 24 +- docs/pkiSecretBackendKey.go.md | 24 +- docs/pkiSecretBackendKey.java.md | 44 +- docs/pkiSecretBackendKey.python.md | 44 +- docs/pkiSecretBackendKey.typescript.md | 24 +- docs/pkiSecretBackendRole.csharp.md | 106 +- docs/pkiSecretBackendRole.go.md | 106 +- docs/pkiSecretBackendRole.java.md | 202 ++-- docs/pkiSecretBackendRole.python.md | 202 ++-- docs/pkiSecretBackendRole.typescript.md | 106 +- docs/pkiSecretBackendRootCert.csharp.md | 64 +- docs/pkiSecretBackendRootCert.go.md | 64 +- docs/pkiSecretBackendRootCert.java.md | 124 +- docs/pkiSecretBackendRootCert.python.md | 124 +- docs/pkiSecretBackendRootCert.typescript.md | 64 +- ...ecretBackendRootSignIntermediate.csharp.md | 54 +- ...pkiSecretBackendRootSignIntermediate.go.md | 54 +- ...iSecretBackendRootSignIntermediate.java.md | 104 +- ...ecretBackendRootSignIntermediate.python.md | 104 +- ...tBackendRootSignIntermediate.typescript.md | 54 +- docs/pkiSecretBackendSign.csharp.md | 38 +- docs/pkiSecretBackendSign.go.md | 38 +- docs/pkiSecretBackendSign.java.md | 72 +- docs/pkiSecretBackendSign.python.md | 72 +- docs/pkiSecretBackendSign.typescript.md | 38 +- docs/plugin.csharp.md | 26 +- docs/plugin.go.md | 26 +- docs/plugin.java.md | 48 +- docs/plugin.python.md | 48 +- docs/plugin.typescript.md | 26 +- docs/pluginPinnedVersion.csharp.md | 14 +- docs/pluginPinnedVersion.go.md | 14 +- docs/pluginPinnedVersion.java.md | 24 +- docs/pluginPinnedVersion.python.md | 24 +- docs/pluginPinnedVersion.typescript.md | 14 +- docs/policy.csharp.md | 14 +- docs/policy.go.md | 14 +- docs/policy.java.md | 24 +- docs/policy.python.md | 24 +- docs/policy.typescript.md | 14 +- docs/provider.csharp.md | 254 ++--- docs/provider.go.md | 254 ++--- docs/provider.java.md | 316 ++--- docs/provider.python.md | 316 ++--- docs/provider.typescript.md | 254 ++--- docs/quotaLeaseCount.csharp.md | 20 +- docs/quotaLeaseCount.go.md | 20 +- docs/quotaLeaseCount.java.md | 36 +- docs/quotaLeaseCount.python.md | 36 +- docs/quotaLeaseCount.typescript.md | 20 +- docs/quotaRateLimit.csharp.md | 24 +- docs/quotaRateLimit.go.md | 24 +- docs/quotaRateLimit.java.md | 44 +- docs/quotaRateLimit.python.md | 44 +- docs/quotaRateLimit.typescript.md | 24 +- docs/rabbitmqSecretBackend.csharp.md | 32 +- docs/rabbitmqSecretBackend.go.md | 32 +- docs/rabbitmqSecretBackend.java.md | 60 +- docs/rabbitmqSecretBackend.python.md | 60 +- docs/rabbitmqSecretBackend.typescript.md | 32 +- docs/rabbitmqSecretBackendRole.csharp.md | 38 +- docs/rabbitmqSecretBackendRole.go.md | 38 +- docs/rabbitmqSecretBackendRole.java.md | 54 +- docs/rabbitmqSecretBackendRole.python.md | 54 +- docs/rabbitmqSecretBackendRole.typescript.md | 38 +- docs/raftAutopilot.csharp.md | 24 +- docs/raftAutopilot.go.md | 24 +- docs/raftAutopilot.java.md | 44 +- docs/raftAutopilot.python.md | 44 +- docs/raftAutopilot.typescript.md | 24 +- docs/raftSnapshotAgentConfig.csharp.md | 64 +- docs/raftSnapshotAgentConfig.go.md | 64 +- docs/raftSnapshotAgentConfig.java.md | 124 +- docs/raftSnapshotAgentConfig.python.md | 124 +- docs/raftSnapshotAgentConfig.typescript.md | 64 +- docs/rgpPolicy.csharp.md | 16 +- docs/rgpPolicy.go.md | 16 +- docs/rgpPolicy.java.md | 28 +- docs/rgpPolicy.python.md | 28 +- docs/rgpPolicy.typescript.md | 16 +- docs/samlAuthBackend.csharp.md | 30 +- docs/samlAuthBackend.go.md | 30 +- docs/samlAuthBackend.java.md | 56 +- docs/samlAuthBackend.python.md | 56 +- docs/samlAuthBackend.typescript.md | 30 +- docs/samlAuthBackendRole.csharp.md | 42 +- docs/samlAuthBackendRole.go.md | 42 +- docs/samlAuthBackendRole.java.md | 80 +- docs/samlAuthBackendRole.python.md | 80 +- docs/samlAuthBackendRole.typescript.md | 42 +- docs/secretsSyncAssociation.csharp.md | 18 +- docs/secretsSyncAssociation.go.md | 18 +- docs/secretsSyncAssociation.java.md | 32 +- docs/secretsSyncAssociation.python.md | 32 +- docs/secretsSyncAssociation.typescript.md | 18 +- docs/secretsSyncAwsDestination.csharp.md | 28 +- docs/secretsSyncAwsDestination.go.md | 28 +- docs/secretsSyncAwsDestination.java.md | 52 +- docs/secretsSyncAwsDestination.python.md | 52 +- docs/secretsSyncAwsDestination.typescript.md | 28 +- docs/secretsSyncAzureDestination.csharp.md | 28 +- docs/secretsSyncAzureDestination.go.md | 28 +- docs/secretsSyncAzureDestination.java.md | 52 +- docs/secretsSyncAzureDestination.python.md | 52 +- .../secretsSyncAzureDestination.typescript.md | 28 +- docs/secretsSyncConfig.csharp.md | 14 +- docs/secretsSyncConfig.go.md | 14 +- docs/secretsSyncConfig.java.md | 24 +- docs/secretsSyncConfig.python.md | 24 +- docs/secretsSyncConfig.typescript.md | 14 +- docs/secretsSyncGcpDestination.csharp.md | 22 +- docs/secretsSyncGcpDestination.go.md | 22 +- docs/secretsSyncGcpDestination.java.md | 40 +- docs/secretsSyncGcpDestination.python.md | 40 +- docs/secretsSyncGcpDestination.typescript.md | 22 +- docs/secretsSyncGhDestination.csharp.md | 26 +- docs/secretsSyncGhDestination.go.md | 26 +- docs/secretsSyncGhDestination.java.md | 48 +- docs/secretsSyncGhDestination.python.md | 48 +- docs/secretsSyncGhDestination.typescript.md | 26 +- docs/secretsSyncGithubApps.csharp.md | 16 +- docs/secretsSyncGithubApps.go.md | 16 +- docs/secretsSyncGithubApps.java.md | 28 +- docs/secretsSyncGithubApps.python.md | 28 +- docs/secretsSyncGithubApps.typescript.md | 16 +- docs/secretsSyncVercelDestination.csharp.md | 24 +- docs/secretsSyncVercelDestination.go.md | 24 +- docs/secretsSyncVercelDestination.java.md | 44 +- docs/secretsSyncVercelDestination.python.md | 44 +- ...secretsSyncVercelDestination.typescript.md | 24 +- docs/sshSecretBackendCa.csharp.md | 22 +- docs/sshSecretBackendCa.go.md | 22 +- docs/sshSecretBackendCa.java.md | 40 +- docs/sshSecretBackendCa.python.md | 40 +- docs/sshSecretBackendCa.typescript.md | 22 +- docs/sshSecretBackendRole.csharp.md | 151 ++- docs/sshSecretBackendRole.go.md | 151 ++- docs/sshSecretBackendRole.java.md | 263 +++-- docs/sshSecretBackendRole.python.md | 261 +++-- docs/sshSecretBackendRole.typescript.md | 150 ++- docs/terraformCloudSecretBackend.csharp.md | 26 +- docs/terraformCloudSecretBackend.go.md | 26 +- docs/terraformCloudSecretBackend.java.md | 48 +- docs/terraformCloudSecretBackend.python.md | 48 +- .../terraformCloudSecretBackend.typescript.md | 26 +- docs/terraformCloudSecretCreds.csharp.md | 14 +- docs/terraformCloudSecretCreds.go.md | 14 +- docs/terraformCloudSecretCreds.java.md | 24 +- docs/terraformCloudSecretCreds.python.md | 24 +- docs/terraformCloudSecretCreds.typescript.md | 14 +- docs/terraformCloudSecretRole.csharp.md | 24 +- docs/terraformCloudSecretRole.go.md | 24 +- docs/terraformCloudSecretRole.java.md | 44 +- docs/terraformCloudSecretRole.python.md | 44 +- docs/terraformCloudSecretRole.typescript.md | 24 +- docs/token.csharp.md | 38 +- docs/token.go.md | 38 +- docs/token.java.md | 72 +- docs/token.python.md | 72 +- docs/token.typescript.md | 38 +- docs/tokenAuthBackendRole.csharp.md | 46 +- docs/tokenAuthBackendRole.go.md | 46 +- docs/tokenAuthBackendRole.java.md | 88 +- docs/tokenAuthBackendRole.python.md | 88 +- docs/tokenAuthBackendRole.typescript.md | 46 +- docs/transformAlphabet.csharp.md | 16 +- docs/transformAlphabet.go.md | 16 +- docs/transformAlphabet.java.md | 28 +- docs/transformAlphabet.python.md | 28 +- docs/transformAlphabet.typescript.md | 16 +- docs/transformRole.csharp.md | 16 +- docs/transformRole.go.md | 16 +- docs/transformRole.java.md | 28 +- docs/transformRole.python.md | 28 +- docs/transformRole.typescript.md | 16 +- docs/transformTemplate.csharp.md | 24 +- docs/transformTemplate.go.md | 24 +- docs/transformTemplate.java.md | 44 +- docs/transformTemplate.python.md | 44 +- docs/transformTemplate.typescript.md | 24 +- docs/transformTransformation.csharp.md | 28 +- docs/transformTransformation.go.md | 28 +- docs/transformTransformation.java.md | 52 +- docs/transformTransformation.python.md | 52 +- docs/transformTransformation.typescript.md | 28 +- docs/transitSecretBackendKey.csharp.md | 34 +- docs/transitSecretBackendKey.go.md | 34 +- docs/transitSecretBackendKey.java.md | 64 +- docs/transitSecretBackendKey.python.md | 64 +- docs/transitSecretBackendKey.typescript.md | 34 +- docs/transitSecretCacheConfig.csharp.md | 14 +- docs/transitSecretCacheConfig.go.md | 14 +- docs/transitSecretCacheConfig.java.md | 24 +- docs/transitSecretCacheConfig.python.md | 24 +- docs/transitSecretCacheConfig.typescript.md | 14 +- package.json | 2 +- src/ad-secret-backend/README.md | 2 +- src/ad-secret-backend/index.ts | 80 +- src/ad-secret-library/README.md | 2 +- src/ad-secret-library/index.ts | 26 +- src/ad-secret-role/README.md | 2 +- src/ad-secret-role/index.ts | 22 +- src/alicloud-auth-backend-role/README.md | 2 +- src/alicloud-auth-backend-role/index.ts | 38 +- src/approle-auth-backend-login/README.md | 2 +- src/approle-auth-backend-login/index.ts | 20 +- .../README.md | 2 +- .../index.ts | 88 +- src/approle-auth-backend-role/README.md | 2 +- src/approle-auth-backend-role/index.ts | 46 +- src/audit-request-header/README.md | 2 +- src/audit-request-header/index.ts | 18 +- src/audit/README.md | 2 +- src/audit/index.ts | 24 +- src/auth-backend/README.md | 2 +- src/auth-backend/index.ts | 44 +- src/aws-auth-backend-cert/README.md | 2 +- src/aws-auth-backend-cert/index.ts | 22 +- src/aws-auth-backend-client/README.md | 2 +- src/aws-auth-backend-client/index.ts | 40 +- .../README.md | 2 +- src/aws-auth-backend-config-identity/index.ts | 24 +- .../README.md | 2 +- .../index.ts | 20 +- src/aws-auth-backend-login/README.md | 2 +- src/aws-auth-backend-login/index.ts | 34 +- src/aws-auth-backend-role-tag/README.md | 2 +- src/aws-auth-backend-role-tag/index.ts | 28 +- src/aws-auth-backend-role/README.md | 2 +- src/aws-auth-backend-role/index.ts | 68 +- .../README.md | 2 +- .../index.ts | 20 +- src/aws-auth-backend-sts-role/README.md | 2 +- src/aws-auth-backend-sts-role/index.ts | 20 +- src/aws-secret-backend-role/README.md | 2 +- src/aws-secret-backend-role/index.ts | 42 +- src/aws-secret-backend-static-role/README.md | 2 +- src/aws-secret-backend-static-role/index.ts | 22 +- src/aws-secret-backend/README.md | 2 +- src/aws-secret-backend/index.ts | 46 +- src/azure-auth-backend-config/README.md | 2 +- src/azure-auth-backend-config/index.ts | 30 +- src/azure-auth-backend-role/README.md | 2 +- src/azure-auth-backend-role/index.ts | 48 +- src/azure-secret-backend-role/README.md | 2 +- src/azure-secret-backend-role/index.ts | 44 +- src/azure-secret-backend/README.md | 2 +- src/azure-secret-backend/index.ts | 38 +- src/cert-auth-backend-role/README.md | 2 +- src/cert-auth-backend-role/index.ts | 64 +- src/config-ui-custom-message/README.md | 2 +- src/config-ui-custom-message/index.ts | 32 +- src/consul-secret-backend-role/README.md | 2 +- src/consul-secret-backend-role/index.ts | 38 +- src/consul-secret-backend/README.md | 2 +- src/consul-secret-backend/index.ts | 40 +- .../README.md | 2 +- src/data-vault-ad-access-credentials/index.ts | 18 +- .../README.md | 2 +- .../index.ts | 18 +- src/data-vault-auth-backend/README.md | 2 +- src/data-vault-auth-backend/index.ts | 16 +- src/data-vault-auth-backends/README.md | 2 +- src/data-vault-auth-backends/index.ts | 16 +- .../README.md | 2 +- .../index.ts | 26 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 32 +- .../README.md | 2 +- src/data-vault-gcp-auth-backend-role/index.ts | 36 +- src/data-vault-generic-secret/README.md | 2 +- src/data-vault-generic-secret/index.ts | 20 +- src/data-vault-identity-entity/README.md | 2 +- src/data-vault-identity-entity/index.ts | 24 +- src/data-vault-identity-group/README.md | 2 +- src/data-vault-identity-group/index.ts | 24 +- .../README.md | 2 +- .../index.ts | 16 +- .../README.md | 2 +- .../index.ts | 16 +- .../README.md | 2 +- .../index.ts | 16 +- .../README.md | 2 +- .../index.ts | 58 +- .../README.md | 2 +- .../index.ts | 38 +- .../README.md | 2 +- .../index.ts | 24 +- src/data-vault-kv-secret-subkeys-v2/README.md | 2 +- src/data-vault-kv-secret-subkeys-v2/index.ts | 22 +- src/data-vault-kv-secret-v2/README.md | 2 +- src/data-vault-kv-secret-v2/index.ts | 20 +- src/data-vault-kv-secret/README.md | 2 +- src/data-vault-kv-secret/index.ts | 16 +- src/data-vault-kv-secrets-list-v2/README.md | 2 +- src/data-vault-kv-secrets-list-v2/index.ts | 18 +- src/data-vault-kv-secrets-list/README.md | 2 +- src/data-vault-kv-secrets-list/index.ts | 16 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 18 +- src/data-vault-namespace/README.md | 2 +- src/data-vault-namespace/index.ts | 16 +- src/data-vault-namespaces/README.md | 2 +- src/data-vault-namespaces/index.ts | 14 +- src/data-vault-nomad-access-token/README.md | 2 +- src/data-vault-nomad-access-token/index.ts | 18 +- .../README.md | 2 +- .../index.ts | 16 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 16 +- .../README.md | 2 +- .../index.ts | 18 +- .../README.md | 2 +- .../index.ts | 16 +- src/data-vault-policy-document/README.md | 2 +- src/data-vault-policy-document/index.ts | 40 +- src/data-vault-raft-autopilot-state/README.md | 2 +- src/data-vault-raft-autopilot-state/index.ts | 14 +- src/data-vault-transform-decode/README.md | 2 +- src/data-vault-transform-decode/index.ts | 30 +- src/data-vault-transform-encode/README.md | 2 +- src/data-vault-transform-encode/index.ts | 30 +- src/data-vault-transit-decrypt/README.md | 2 +- src/data-vault-transit-decrypt/index.ts | 22 +- src/data-vault-transit-encrypt/README.md | 2 +- src/data-vault-transit-encrypt/index.ts | 24 +- .../README.md | 2 +- .../index.ts | 545 ++++++--- src/database-secret-backend-role/README.md | 2 +- src/database-secret-backend-role/index.ts | 36 +- .../README.md | 2 +- .../index.ts | 60 +- src/database-secrets-mount/README.md | 2 +- src/database-secrets-mount/index.ts | 781 ++++++++----- src/egp-policy/README.md | 2 +- src/egp-policy/index.ts | 22 +- src/gcp-auth-backend-role/README.md | 2 +- src/gcp-auth-backend-role/index.ts | 56 +- src/gcp-auth-backend/README.md | 2 +- src/gcp-auth-backend/index.ts | 68 +- src/gcp-secret-backend/README.md | 2 +- src/gcp-secret-backend/index.ts | 36 +- src/gcp-secret-impersonated-account/README.md | 2 +- src/gcp-secret-impersonated-account/index.ts | 52 +- src/gcp-secret-roleset/README.md | 2 +- src/gcp-secret-roleset/index.ts | 30 +- src/gcp-secret-static-account/README.md | 2 +- src/gcp-secret-static-account/index.ts | 30 +- src/generic-endpoint/README.md | 2 +- src/generic-endpoint/index.ts | 26 +- src/generic-secret/README.md | 2 +- src/generic-secret/index.ts | 22 +- src/github-auth-backend/README.md | 2 +- src/github-auth-backend/index.ts | 62 +- src/github-team/README.md | 2 +- src/github-team/index.ts | 20 +- src/github-user/README.md | 2 +- src/github-user/index.ts | 20 +- src/identity-entity-alias/README.md | 2 +- src/identity-entity-alias/index.ts | 22 +- src/identity-entity-policies/README.md | 2 +- src/identity-entity-policies/index.ts | 20 +- src/identity-entity/README.md | 2 +- src/identity-entity/index.ts | 24 +- src/identity-group-alias/README.md | 2 +- src/identity-group-alias/index.ts | 20 +- .../README.md | 2 +- src/identity-group-member-entity-ids/index.ts | 20 +- src/identity-group-member-group-ids/README.md | 2 +- src/identity-group-member-group-ids/index.ts | 20 +- src/identity-group-policies/README.md | 2 +- src/identity-group-policies/index.ts | 20 +- src/identity-group/README.md | 2 +- src/identity-group/index.ts | 32 +- src/identity-mfa-duo/README.md | 2 +- src/identity-mfa-duo/index.ts | 26 +- src/identity-mfa-login-enforcement/README.md | 2 +- src/identity-mfa-login-enforcement/index.ts | 26 +- src/identity-mfa-okta/README.md | 2 +- src/identity-mfa-okta/index.ts | 24 +- src/identity-mfa-pingid/README.md | 2 +- src/identity-mfa-pingid/index.ts | 18 +- src/identity-mfa-totp/README.md | 2 +- src/identity-mfa-totp/index.ts | 30 +- src/identity-oidc-assignment/README.md | 2 +- src/identity-oidc-assignment/index.ts | 20 +- src/identity-oidc-client/README.md | 2 +- src/identity-oidc-client/index.ts | 28 +- .../README.md | 2 +- .../index.ts | 18 +- src/identity-oidc-key/README.md | 2 +- src/identity-oidc-key/index.ts | 24 +- src/identity-oidc-provider/README.md | 2 +- src/identity-oidc-provider/index.ts | 24 +- src/identity-oidc-role/README.md | 2 +- src/identity-oidc-role/index.ts | 24 +- src/identity-oidc-scope/README.md | 2 +- src/identity-oidc-scope/index.ts | 20 +- src/identity-oidc/README.md | 2 +- src/identity-oidc/index.ts | 16 +- src/jwt-auth-backend-role/README.md | 2 +- src/jwt-auth-backend-role/index.ts | 70 +- src/jwt-auth-backend/README.md | 2 +- src/jwt-auth-backend/index.ts | 70 +- src/kmip-secret-backend/README.md | 2 +- src/kmip-secret-backend/index.ts | 38 +- src/kmip-secret-role/README.md | 2 +- src/kmip-secret-role/index.ts | 54 +- src/kmip-secret-scope/README.md | 2 +- src/kmip-secret-scope/index.ts | 20 +- src/kubernetes-auth-backend-config/README.md | 2 +- src/kubernetes-auth-backend-config/index.ts | 60 +- src/kubernetes-auth-backend-role/README.md | 2 +- src/kubernetes-auth-backend-role/index.ts | 44 +- src/kubernetes-secret-backend-role/README.md | 2 +- src/kubernetes-secret-backend-role/index.ts | 40 +- src/kubernetes-secret-backend/README.md | 2 +- src/kubernetes-secret-backend/index.ts | 56 +- src/kv-secret-backend-v2/README.md | 2 +- src/kv-secret-backend-v2/index.ts | 22 +- src/kv-secret-v2/README.md | 2 +- src/kv-secret-v2/index.ts | 38 +- src/kv-secret/README.md | 2 +- src/kv-secret/index.ts | 18 +- src/ldap-auth-backend-group/README.md | 2 +- src/ldap-auth-backend-group/index.ts | 20 +- src/ldap-auth-backend-user/README.md | 2 +- src/ldap-auth-backend-user/index.ts | 22 +- src/ldap-auth-backend/README.md | 2 +- src/ldap-auth-backend/index.ts | 114 +- .../README.md | 2 +- src/ldap-secret-backend-dynamic-role/index.ts | 30 +- src/ldap-secret-backend-library-set/README.md | 2 +- src/ldap-secret-backend-library-set/index.ts | 26 +- src/ldap-secret-backend-static-role/README.md | 2 +- src/ldap-secret-backend-static-role/index.ts | 26 +- src/ldap-secret-backend/README.md | 2 +- src/ldap-secret-backend/index.ts | 82 +- src/managed-keys/README.md | 2 +- src/managed-keys/index.ts | 104 +- src/mfa-duo/README.md | 2 +- src/mfa-duo/index.ts | 28 +- src/mfa-okta/README.md | 2 +- src/mfa-okta/index.ts | 28 +- src/mfa-pingid/README.md | 2 +- src/mfa-pingid/index.ts | 22 +- src/mfa-totp/README.md | 2 +- src/mfa-totp/index.ts | 30 +- src/mongodbatlas-secret-backend/README.md | 2 +- src/mongodbatlas-secret-backend/index.ts | 20 +- src/mongodbatlas-secret-role/README.md | 2 +- src/mongodbatlas-secret-role/index.ts | 34 +- src/mount/README.md | 2 +- src/mount/index.ts | 50 +- src/namespace/README.md | 2 +- src/namespace/index.ts | 20 +- src/nomad-secret-backend/README.md | 2 +- src/nomad-secret-backend/index.ts | 42 +- src/nomad-secret-role/README.md | 2 +- src/nomad-secret-role/index.ts | 24 +- src/okta-auth-backend-group/README.md | 2 +- src/okta-auth-backend-group/index.ts | 20 +- src/okta-auth-backend-user/README.md | 2 +- src/okta-auth-backend-user/index.ts | 22 +- src/okta-auth-backend/README.md | 2 +- src/okta-auth-backend/index.ts | 64 +- src/password-policy/README.md | 2 +- src/password-policy/index.ts | 18 +- src/pki-secret-backend-cert/README.md | 2 +- src/pki-secret-backend-cert/index.ts | 46 +- src/pki-secret-backend-config-ca/README.md | 2 +- src/pki-secret-backend-config-ca/index.ts | 18 +- .../README.md | 2 +- .../index.ts | 20 +- src/pki-secret-backend-config-est/README.md | 2 +- src/pki-secret-backend-config-est/index.ts | 34 +- .../README.md | 2 +- .../index.ts | 20 +- src/pki-secret-backend-config-urls/README.md | 2 +- src/pki-secret-backend-config-urls/index.ts | 24 +- src/pki-secret-backend-crl-config/README.md | 2 +- src/pki-secret-backend-crl-config/index.ts | 38 +- .../README.md | 2 +- .../index.ts | 62 +- .../README.md | 2 +- .../index.ts | 18 +- src/pki-secret-backend-issuer/README.md | 2 +- src/pki-secret-backend-issuer/index.ts | 36 +- src/pki-secret-backend-key/README.md | 2 +- src/pki-secret-backend-key/index.ts | 28 +- src/pki-secret-backend-role/README.md | 2 +- src/pki-secret-backend-role/index.ts | 110 +- src/pki-secret-backend-root-cert/README.md | 2 +- src/pki-secret-backend-root-cert/index.ts | 68 +- .../README.md | 2 +- .../index.ts | 58 +- src/pki-secret-backend-sign/README.md | 2 +- src/pki-secret-backend-sign/index.ts | 42 +- src/plugin-pinned-version/README.md | 2 +- src/plugin-pinned-version/index.ts | 18 +- src/plugin/README.md | 2 +- src/plugin/index.ts | 30 +- src/policy/README.md | 2 +- src/policy/index.ts | 18 +- src/provider/README.md | 2 +- src/provider/index.ts | 254 ++--- src/quota-lease-count/README.md | 2 +- src/quota-lease-count/index.ts | 24 +- src/quota-rate-limit/README.md | 2 +- src/quota-rate-limit/index.ts | 28 +- src/rabbitmq-secret-backend-role/README.md | 2 +- src/rabbitmq-secret-backend-role/index.ts | 42 +- src/rabbitmq-secret-backend/README.md | 2 +- src/rabbitmq-secret-backend/index.ts | 36 +- src/raft-autopilot/README.md | 2 +- src/raft-autopilot/index.ts | 28 +- src/raft-snapshot-agent-config/README.md | 2 +- src/raft-snapshot-agent-config/index.ts | 68 +- src/rgp-policy/README.md | 2 +- src/rgp-policy/index.ts | 20 +- src/saml-auth-backend-role/README.md | 2 +- src/saml-auth-backend-role/index.ts | 46 +- src/saml-auth-backend/README.md | 2 +- src/saml-auth-backend/index.ts | 34 +- src/secrets-sync-association/README.md | 2 +- src/secrets-sync-association/index.ts | 22 +- src/secrets-sync-aws-destination/README.md | 2 +- src/secrets-sync-aws-destination/index.ts | 32 +- src/secrets-sync-azure-destination/README.md | 2 +- src/secrets-sync-azure-destination/index.ts | 32 +- src/secrets-sync-config/README.md | 2 +- src/secrets-sync-config/index.ts | 18 +- src/secrets-sync-gcp-destination/README.md | 2 +- src/secrets-sync-gcp-destination/index.ts | 26 +- src/secrets-sync-gh-destination/README.md | 2 +- src/secrets-sync-gh-destination/index.ts | 30 +- src/secrets-sync-github-apps/README.md | 2 +- src/secrets-sync-github-apps/index.ts | 20 +- src/secrets-sync-vercel-destination/README.md | 2 +- src/secrets-sync-vercel-destination/index.ts | 28 +- src/ssh-secret-backend-ca/README.md | 2 +- src/ssh-secret-backend-ca/index.ts | 26 +- src/ssh-secret-backend-role/README.md | 2 +- src/ssh-secret-backend-role/index.ts | 96 +- src/terraform-cloud-secret-backend/README.md | 2 +- src/terraform-cloud-secret-backend/index.ts | 30 +- src/terraform-cloud-secret-creds/README.md | 2 +- src/terraform-cloud-secret-creds/index.ts | 18 +- src/terraform-cloud-secret-role/README.md | 2 +- src/terraform-cloud-secret-role/index.ts | 28 +- src/token-auth-backend-role/README.md | 2 +- src/token-auth-backend-role/index.ts | 50 +- src/token/README.md | 2 +- src/token/index.ts | 42 +- src/transform-alphabet/README.md | 2 +- src/transform-alphabet/index.ts | 20 +- src/transform-role/README.md | 2 +- src/transform-role/index.ts | 20 +- src/transform-template/README.md | 2 +- src/transform-template/index.ts | 28 +- src/transform-transformation/README.md | 2 +- src/transform-transformation/index.ts | 32 +- src/transit-secret-backend-key/README.md | 2 +- src/transit-secret-backend-key/index.ts | 38 +- src/transit-secret-cache-config/README.md | 2 +- src/transit-secret-cache-config/index.ts | 18 +- src/version.json | 2 +- 1319 files changed, 29548 insertions(+), 24665 deletions(-) diff --git a/README.md b/README.md index fec6c141..b967bbc2 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ -# CDKTF prebuilt bindings for hashicorp/vault provider version 4.4.0 +# CDKTF prebuilt bindings for hashicorp/vault provider version 4.5.0 -This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs) bindings for [CDK for Terraform](https://cdk.tf). +This repo builds and publishes the [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs) bindings for [CDK for Terraform](https://cdk.tf). ## Available Packages @@ -63,7 +63,7 @@ This project is explicitly not tracking the Terraform vault provider version 1:1 These are the upstream dependencies: - [CDK for Terraform](https://cdk.tf) -- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.4.0) +- [Terraform vault provider](https://registry.terraform.io/providers/hashicorp/vault/4.5.0) - [Terraform Engine](https://terraform.io) If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. diff --git a/docs/adSecretBackend.csharp.md b/docs/adSecretBackend.csharp.md index 5bd6828a..ce54d331 100644 --- a/docs/adSecretBackend.csharp.md +++ b/docs/adSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1743,7 +1743,7 @@ new AdSecretBackendConfig { | Groupattr | string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | Groupdn | string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | Groupfilter | string | Go template for querying group membership of user. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | InsecureTls | object | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | LastRotationTolerance | double | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | Local | object | Mark the secrets engine as local-only. | @@ -1845,7 +1845,7 @@ public string Binddn { get; set; } Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1859,7 +1859,7 @@ public string Bindpass { get; set; } LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1873,7 +1873,7 @@ public object AnonymousGroupSearch { get; set; } Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1887,7 +1887,7 @@ public string Backend { get; set; } The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1901,7 +1901,7 @@ public object CaseSensitiveNames { get; set; } If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1915,7 +1915,7 @@ public string Certificate { get; set; } CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1929,7 +1929,7 @@ public string ClientTlsCert { get; set; } Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -1943,7 +1943,7 @@ public string ClientTlsKey { get; set; } Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -1957,7 +1957,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -1971,7 +1971,7 @@ public object DenyNullBind { get; set; } Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -1985,7 +1985,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -1999,7 +1999,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2013,7 +2013,7 @@ public object Discoverdn { get; set; } Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2029,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2043,7 +2043,7 @@ public string Groupdn { get; set; } LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2059,7 +2059,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2071,7 +2071,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2088,7 +2088,7 @@ public object InsecureTls { get; set; } Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2102,7 +2102,7 @@ public double LastRotationTolerance { get; set; } The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2118,7 +2118,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2132,7 +2132,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2146,7 +2146,7 @@ public double MaxTtl { get; set; } In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2160,7 +2160,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2174,7 +2174,7 @@ public string PasswordPolicy { get; set; } Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2188,7 +2188,7 @@ public double RequestTimeout { get; set; } Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2202,7 +2202,7 @@ public object Starttls { get; set; } Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2216,7 +2216,7 @@ public string TlsMaxVersion { get; set; } Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2230,7 +2230,7 @@ public string TlsMinVersion { get; set; } Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2244,7 +2244,7 @@ public double Ttl { get; set; } In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2258,7 +2258,7 @@ public string Upndomain { get; set; } Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2272,7 +2272,7 @@ public string Url { get; set; } LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2286,7 +2286,7 @@ public object UsePre111GroupCnBehavior { get; set; } In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2300,7 +2300,7 @@ public string Userattr { get; set; } Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2314,7 +2314,7 @@ public string Userdn { get; set; } LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2330,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.go.md b/docs/adSecretBackend.go.md index 3f882bbc..6cec8d09 100644 --- a/docs/adSecretBackend.go.md +++ b/docs/adSecretBackend.go.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1743,7 +1743,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretbackend" | Groupattr | *string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | Groupdn | *string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | Groupfilter | *string | Go template for querying group membership of user. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | InsecureTls | interface{} | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | LastRotationTolerance | *f64 | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | Local | interface{} | Mark the secrets engine as local-only. | @@ -1845,7 +1845,7 @@ Binddn *string Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1859,7 +1859,7 @@ Bindpass *string LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1873,7 +1873,7 @@ AnonymousGroupSearch interface{} Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1887,7 +1887,7 @@ Backend *string The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1901,7 +1901,7 @@ CaseSensitiveNames interface{} If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1915,7 +1915,7 @@ Certificate *string CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1929,7 +1929,7 @@ ClientTlsCert *string Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -1943,7 +1943,7 @@ ClientTlsKey *string Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -1957,7 +1957,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -1971,7 +1971,7 @@ DenyNullBind interface{} Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -1985,7 +1985,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -1999,7 +1999,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2013,7 +2013,7 @@ Discoverdn interface{} Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2029,7 +2029,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2043,7 +2043,7 @@ Groupdn *string LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2059,7 +2059,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2071,7 +2071,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2088,7 +2088,7 @@ InsecureTls interface{} Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2102,7 +2102,7 @@ LastRotationTolerance *f64 The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2118,7 +2118,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2132,7 +2132,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2146,7 +2146,7 @@ MaxTtl *f64 In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2160,7 +2160,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2174,7 +2174,7 @@ PasswordPolicy *string Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2188,7 +2188,7 @@ RequestTimeout *f64 Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2202,7 +2202,7 @@ Starttls interface{} Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2216,7 +2216,7 @@ TlsMaxVersion *string Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2230,7 +2230,7 @@ TlsMinVersion *string Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2244,7 +2244,7 @@ Ttl *f64 In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2258,7 +2258,7 @@ Upndomain *string Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2272,7 +2272,7 @@ Url *string LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2286,7 +2286,7 @@ UsePre111GroupCnBehavior interface{} In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2300,7 +2300,7 @@ Userattr *string Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2314,7 +2314,7 @@ Userdn *string LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2330,7 +2330,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.java.md b/docs/adSecretBackend.java.md index baee1a17..c4da6530 100644 --- a/docs/adSecretBackend.java.md +++ b/docs/adSecretBackend.java.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -98,7 +98,7 @@ AdSecretBackend.Builder.create(Construct scope, java.lang.String id) | groupattr | java.lang.String | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | java.lang.String | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | java.lang.String | Go template for querying group membership of user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | java.lang.Number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | @@ -186,7 +186,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -318,7 +318,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -340,7 +340,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -361,7 +361,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -383,7 +383,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -423,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -453,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -463,7 +463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -473,7 +473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -483,7 +483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -493,7 +493,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -503,7 +503,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -513,7 +513,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -523,7 +523,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -535,7 +535,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- @@ -1193,7 +1193,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -2252,7 +2252,7 @@ AdSecretBackendConfig.builder() | groupattr | java.lang.String | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | java.lang.String | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | java.lang.String | Go template for querying group membership of user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | java.lang.Number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | @@ -2354,7 +2354,7 @@ public java.lang.String getBinddn(); Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -2368,7 +2368,7 @@ public java.lang.String getBindpass(); LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -2382,7 +2382,7 @@ public java.lang.Object getAnonymousGroupSearch(); Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -2396,7 +2396,7 @@ public java.lang.String getBackend(); The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -2410,7 +2410,7 @@ public java.lang.Object getCaseSensitiveNames(); If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -2424,7 +2424,7 @@ public java.lang.String getCertificate(); CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -2438,7 +2438,7 @@ public java.lang.String getClientTlsCert(); Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2452,7 +2452,7 @@ public java.lang.String getClientTlsKey(); Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2466,7 +2466,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2480,7 +2480,7 @@ public java.lang.Object getDenyNullBind(); Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2494,7 +2494,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2508,7 +2508,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2522,7 +2522,7 @@ public java.lang.Object getDiscoverdn(); Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2538,7 +2538,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2552,7 +2552,7 @@ public java.lang.String getGroupdn(); LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2568,7 +2568,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2580,7 +2580,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2597,7 +2597,7 @@ public java.lang.Object getInsecureTls(); Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2611,7 +2611,7 @@ public java.lang.Number getLastRotationTolerance(); The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2627,7 +2627,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2641,7 +2641,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2655,7 +2655,7 @@ public java.lang.Number getMaxTtl(); In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2669,7 +2669,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2683,7 +2683,7 @@ public java.lang.String getPasswordPolicy(); Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2697,7 +2697,7 @@ public java.lang.Number getRequestTimeout(); Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2711,7 +2711,7 @@ public java.lang.Object getStarttls(); Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2725,7 +2725,7 @@ public java.lang.String getTlsMaxVersion(); Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2739,7 +2739,7 @@ public java.lang.String getTlsMinVersion(); Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2753,7 +2753,7 @@ public java.lang.Number getTtl(); In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2767,7 +2767,7 @@ public java.lang.String getUpndomain(); Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2781,7 +2781,7 @@ public java.lang.String getUrl(); LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2795,7 +2795,7 @@ public java.lang.Object getUsePre111GroupCnBehavior(); In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2809,7 +2809,7 @@ public java.lang.String getUserattr(); Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2823,7 +2823,7 @@ public java.lang.String getUserdn(); LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2839,7 +2839,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.python.md b/docs/adSecretBackend.python.md index 88229c6c..c253bdf4 100644 --- a/docs/adSecretBackend.python.md +++ b/docs/adSecretBackend.python.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -86,7 +86,7 @@ adSecretBackend.AdSecretBackend( | groupattr | str | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | str | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | str | Go template for querying group membership of user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | last_rotation_tolerance | typing.Union[int, float] | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | @@ -174,7 +174,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -264,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -284,7 +284,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -294,7 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -306,7 +306,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -328,7 +328,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -336,7 +336,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -349,7 +349,7 @@ If you experience problems setting this value it might not be settable. Please t Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -371,7 +371,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -461,7 +461,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -471,7 +471,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -481,7 +481,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -491,7 +491,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -501,7 +501,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -511,7 +511,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -523,7 +523,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- @@ -1227,7 +1227,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -2272,7 +2272,7 @@ adSecretBackend.AdSecretBackendConfig( | groupattr | str | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | str | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | str | Go template for querying group membership of user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | last_rotation_tolerance | typing.Union[int, float] | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | @@ -2374,7 +2374,7 @@ binddn: str Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -2388,7 +2388,7 @@ bindpass: str LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -2402,7 +2402,7 @@ anonymous_group_search: typing.Union[bool, IResolvable] Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -2416,7 +2416,7 @@ backend: str The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -2430,7 +2430,7 @@ case_sensitive_names: typing.Union[bool, IResolvable] If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -2444,7 +2444,7 @@ certificate: str CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -2458,7 +2458,7 @@ client_tls_cert: str Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -2472,7 +2472,7 @@ client_tls_key: str Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -2486,7 +2486,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -2500,7 +2500,7 @@ deny_null_bind: typing.Union[bool, IResolvable] Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -2514,7 +2514,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -2528,7 +2528,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -2542,7 +2542,7 @@ discoverdn: typing.Union[bool, IResolvable] Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -2558,7 +2558,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2572,7 +2572,7 @@ groupdn: str LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2588,7 +2588,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2600,7 +2600,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2617,7 +2617,7 @@ insecure_tls: typing.Union[bool, IResolvable] Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2631,7 +2631,7 @@ last_rotation_tolerance: typing.Union[int, float] The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2647,7 +2647,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2661,7 +2661,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2675,7 +2675,7 @@ max_ttl: typing.Union[int, float] In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2689,7 +2689,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2703,7 +2703,7 @@ password_policy: str Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2717,7 +2717,7 @@ request_timeout: typing.Union[int, float] Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2731,7 +2731,7 @@ starttls: typing.Union[bool, IResolvable] Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2745,7 +2745,7 @@ tls_max_version: str Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2759,7 +2759,7 @@ tls_min_version: str Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2773,7 +2773,7 @@ ttl: typing.Union[int, float] In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2787,7 +2787,7 @@ upndomain: str Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2801,7 +2801,7 @@ url: str LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2815,7 +2815,7 @@ use_pre111_group_cn_behavior: typing.Union[bool, IResolvable] In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2829,7 +2829,7 @@ userattr: str Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2843,7 +2843,7 @@ userdn: str LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2859,7 +2859,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretBackend.typescript.md b/docs/adSecretBackend.typescript.md index e669691e..b572cbe7 100644 --- a/docs/adSecretBackend.typescript.md +++ b/docs/adSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AdSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend vault_ad_secret_backend}. #### Initializers @@ -698,7 +698,7 @@ The construct id used in the generated config for the AdSecretBackend to import. The id of the existing AdSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1700,7 +1700,7 @@ const adSecretBackendConfig: adSecretBackend.AdSecretBackendConfig = { ... } | groupattr | string | LDAP attribute to follow on objects returned by in order to enumerate user group membership. | | groupdn | string | LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). | | groupfilter | string | Go template for querying group membership of user. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. | | insecureTls | boolean \| cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | lastRotationTolerance | number | The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. | | local | boolean \| cdktf.IResolvable | Mark the secrets engine as local-only. | @@ -1802,7 +1802,7 @@ public readonly binddn: string; Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#binddn AdSecretBackend#binddn} --- @@ -1816,7 +1816,7 @@ public readonly bindpass: string; LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#bindpass AdSecretBackend#bindpass} --- @@ -1830,7 +1830,7 @@ public readonly anonymousGroupSearch: boolean | IResolvable; Use anonymous binds when performing LDAP group searches (if true the initial credentials will still be used for the initial connection test). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#anonymous_group_search AdSecretBackend#anonymous_group_search} --- @@ -1844,7 +1844,7 @@ public readonly backend: string; The mount path for a backend, for example, the path given in "$ vault auth enable -path=my-ad ad". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#backend AdSecretBackend#backend} --- @@ -1858,7 +1858,7 @@ public readonly caseSensitiveNames: boolean | IResolvable; If true, case sensitivity will be used when comparing usernames and groups for matching policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#case_sensitive_names AdSecretBackend#case_sensitive_names} --- @@ -1872,7 +1872,7 @@ public readonly certificate: string; CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#certificate AdSecretBackend#certificate} --- @@ -1886,7 +1886,7 @@ public readonly clientTlsCert: string; Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_cert AdSecretBackend#client_tls_cert} --- @@ -1900,7 +1900,7 @@ public readonly clientTlsKey: string; Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#client_tls_key AdSecretBackend#client_tls_key} --- @@ -1914,7 +1914,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#default_lease_ttl_seconds AdSecretBackend#default_lease_ttl_seconds} --- @@ -1928,7 +1928,7 @@ public readonly denyNullBind: boolean | IResolvable; Denies an unauthenticated LDAP bind request if the user's password is empty; defaults to true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#deny_null_bind AdSecretBackend#deny_null_bind} --- @@ -1942,7 +1942,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#description AdSecretBackend#description} --- @@ -1956,7 +1956,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#disable_remount AdSecretBackend#disable_remount} --- @@ -1970,7 +1970,7 @@ public readonly discoverdn: boolean | IResolvable; Use anonymous bind to discover the bind DN of a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#discoverdn AdSecretBackend#discoverdn} --- @@ -1986,7 +1986,7 @@ LDAP attribute to follow on objects returned by in order to enumer Examples: "cn" or "memberOf", etc. Default: cn -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupattr AdSecretBackend#groupattr} --- @@ -2000,7 +2000,7 @@ public readonly groupdn: string; LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupdn AdSecretBackend#groupdn} --- @@ -2016,7 +2016,7 @@ Go template for querying group membership of user. The template can access the following context variables: UserDN, Username Example: (&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}})) Default: (|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}})) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#groupfilter AdSecretBackend#groupfilter} --- @@ -2028,7 +2028,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#id AdSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2045,7 +2045,7 @@ public readonly insecureTls: boolean | IResolvable; Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#insecure_tls AdSecretBackend#insecure_tls} --- @@ -2059,7 +2059,7 @@ public readonly lastRotationTolerance: number; The number of seconds after a Vault rotation where, if Active Directory shows a later rotation, it should be considered out-of-band. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#last_rotation_tolerance AdSecretBackend#last_rotation_tolerance} --- @@ -2075,7 +2075,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication.Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#local AdSecretBackend#local} --- @@ -2089,7 +2089,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_lease_ttl_seconds AdSecretBackend#max_lease_ttl_seconds} --- @@ -2103,7 +2103,7 @@ public readonly maxTtl: number; In seconds, the maximum password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#max_ttl AdSecretBackend#max_ttl} --- @@ -2117,7 +2117,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#namespace AdSecretBackend#namespace} --- @@ -2131,7 +2131,7 @@ public readonly passwordPolicy: string; Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#password_policy AdSecretBackend#password_policy} --- @@ -2145,7 +2145,7 @@ public readonly requestTimeout: number; Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#request_timeout AdSecretBackend#request_timeout} --- @@ -2159,7 +2159,7 @@ public readonly starttls: boolean | IResolvable; Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#starttls AdSecretBackend#starttls} --- @@ -2173,7 +2173,7 @@ public readonly tlsMaxVersion: string; Maximum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_max_version AdSecretBackend#tls_max_version} --- @@ -2187,7 +2187,7 @@ public readonly tlsMinVersion: string; Minimum TLS version to use. Accepted values are 'tls10', 'tls11', 'tls12' or 'tls13'. Defaults to 'tls12'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#tls_min_version AdSecretBackend#tls_min_version} --- @@ -2201,7 +2201,7 @@ public readonly ttl: number; In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#ttl AdSecretBackend#ttl} --- @@ -2215,7 +2215,7 @@ public readonly upndomain: string; Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#upndomain AdSecretBackend#upndomain} --- @@ -2229,7 +2229,7 @@ public readonly url: string; LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#url AdSecretBackend#url} --- @@ -2243,7 +2243,7 @@ public readonly usePre111GroupCnBehavior: boolean | IResolvable; In Vault 1.1.1 a fix for handling group CN values of different cases unfortunately introduced a regression that could cause previously defined groups to not be found due to a change in the resulting name. If set true, the pre-1.1.1 behavior for matching group CNs will be used. This is only needed in some upgrade scenarios for backwards compatibility. It is enabled by default if the config is upgraded but disabled by default on new configurations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_pre111_group_cn_behavior AdSecretBackend#use_pre111_group_cn_behavior} --- @@ -2257,7 +2257,7 @@ public readonly userattr: string; Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userattr AdSecretBackend#userattr} --- @@ -2271,7 +2271,7 @@ public readonly userdn: string; LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#userdn AdSecretBackend#userdn} --- @@ -2287,7 +2287,7 @@ If true, use the Active Directory tokenGroups constructed attribute of the user This will find all security groups including nested ones. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_backend#use_token_groups AdSecretBackend#use_token_groups} --- diff --git a/docs/adSecretLibrary.csharp.md b/docs/adSecretLibrary.csharp.md index fe41ab36..aa8ff3ab 100644 --- a/docs/adSecretLibrary.csharp.md +++ b/docs/adSecretLibrary.csharp.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ new AdSecretLibraryConfig { | Name | string | The name of the set of service accounts. | | ServiceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | object | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | MaxTtl | double | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | double | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1001,7 +1001,7 @@ public string Backend { get; set; } The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1015,7 +1015,7 @@ public string Name { get; set; } The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1045,7 +1045,7 @@ public object DisableCheckInEnforcement { get; set; } Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1057,7 +1057,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1074,7 +1074,7 @@ public double MaxTtl { get; set; } The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1088,7 +1088,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1102,7 +1102,7 @@ public double Ttl { get; set; } The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.go.md b/docs/adSecretLibrary.go.md index c59f3940..7838555a 100644 --- a/docs/adSecretLibrary.go.md +++ b/docs/adSecretLibrary.go.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretlibrary" | Name | *string | The name of the set of service accounts. | | ServiceAccountNames | *[]*string | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | interface{} | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | MaxTtl | *f64 | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *f64 | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1001,7 +1001,7 @@ Backend *string The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1015,7 +1015,7 @@ Name *string The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1031,7 +1031,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1045,7 +1045,7 @@ DisableCheckInEnforcement interface{} Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1057,7 +1057,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1074,7 +1074,7 @@ MaxTtl *f64 The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1088,7 +1088,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1102,7 +1102,7 @@ Ttl *f64 The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.java.md b/docs/adSecretLibrary.java.md index ac0ed98f..5d3e34a0 100644 --- a/docs/adSecretLibrary.java.md +++ b/docs/adSecretLibrary.java.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -50,7 +50,7 @@ AdSecretLibrary.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | java.lang.Number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -145,7 +145,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ AdSecretLibraryConfig.builder() | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | java.lang.Number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1162,7 +1162,7 @@ public java.lang.String getBackend(); The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1176,7 +1176,7 @@ public java.lang.String getName(); The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1192,7 +1192,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1206,7 +1206,7 @@ public java.lang.Object getDisableCheckInEnforcement(); Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1218,7 +1218,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1235,7 +1235,7 @@ public java.lang.Number getMaxTtl(); The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1249,7 +1249,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1263,7 +1263,7 @@ public java.lang.Number getTtl(); The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.python.md b/docs/adSecretLibrary.python.md index 42f1bd5f..6d4babb9 100644 --- a/docs/adSecretLibrary.python.md +++ b/docs/adSecretLibrary.python.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -47,7 +47,7 @@ adSecretLibrary.AdSecretLibrary( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -142,7 +142,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -1113,7 +1113,7 @@ adSecretLibrary.AdSecretLibraryConfig( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -1200,7 +1200,7 @@ backend: str The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -1214,7 +1214,7 @@ name: str The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1230,7 +1230,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1244,7 +1244,7 @@ disable_check_in_enforcement: typing.Union[bool, IResolvable] Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1256,7 +1256,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1273,7 +1273,7 @@ max_ttl: typing.Union[int, float] The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1287,7 +1287,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1301,7 +1301,7 @@ ttl: typing.Union[int, float] The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretLibrary.typescript.md b/docs/adSecretLibrary.typescript.md index e1a602a1..a65ac3f6 100644 --- a/docs/adSecretLibrary.typescript.md +++ b/docs/adSecretLibrary.typescript.md @@ -4,7 +4,7 @@ ### AdSecretLibrary -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library vault_ad_secret_library}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library vault_ad_secret_library}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AdSecretLibrary to import. The id of the existing AdSecretLibrary that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#import import section} in the documentation of this resource for the id to use --- @@ -898,7 +898,7 @@ const adSecretLibraryConfig: adSecretLibrary.AdSecretLibraryConfig = { ... } | name | string | The name of the set of service accounts. | | serviceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | boolean \| cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. | | maxTtl | number | The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | number | The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. | @@ -985,7 +985,7 @@ public readonly backend: string; The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#backend AdSecretLibrary#backend} --- @@ -999,7 +999,7 @@ public readonly name: string; The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#name AdSecretLibrary#name} --- @@ -1015,7 +1015,7 @@ The names of all the service accounts that can be checked out from this set. These service accounts must already exist in Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#service_account_names AdSecretLibrary#service_account_names} --- @@ -1029,7 +1029,7 @@ public readonly disableCheckInEnforcement: boolean | IResolvable; Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#disable_check_in_enforcement AdSecretLibrary#disable_check_in_enforcement} --- @@ -1041,7 +1041,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#id AdSecretLibrary#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1058,7 +1058,7 @@ public readonly maxTtl: number; The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#max_ttl AdSecretLibrary#max_ttl} --- @@ -1072,7 +1072,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#namespace AdSecretLibrary#namespace} --- @@ -1086,7 +1086,7 @@ public readonly ttl: number; The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_library#ttl AdSecretLibrary#ttl} --- diff --git a/docs/adSecretRole.csharp.md b/docs/adSecretRole.csharp.md index 2da56732..c40fb755 100644 --- a/docs/adSecretRole.csharp.md +++ b/docs/adSecretRole.csharp.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ new AdSecretRoleConfig { | Backend | string | The mount path for the AD backend. | | Role | string | Name of the role. | | ServiceAccountName | string | The username/logon name for the service account with which this role will be associated. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | double | In seconds, the default password time-to-live. | @@ -961,7 +961,7 @@ public string Backend { get; set; } The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -975,7 +975,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -989,7 +989,7 @@ public string ServiceAccountName { get; set; } The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1001,7 +1001,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1018,7 +1018,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1032,7 +1032,7 @@ public double Ttl { get; set; } In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.go.md b/docs/adSecretRole.go.md index 69f1f28b..78ee5f79 100644 --- a/docs/adSecretRole.go.md +++ b/docs/adSecretRole.go.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/adsecretrole" | Backend | *string | The mount path for the AD backend. | | Role | *string | Name of the role. | | ServiceAccountName | *string | The username/logon name for the service account with which this role will be associated. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *f64 | In seconds, the default password time-to-live. | @@ -961,7 +961,7 @@ Backend *string The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -975,7 +975,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -989,7 +989,7 @@ ServiceAccountName *string The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1001,7 +1001,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1018,7 +1018,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1032,7 +1032,7 @@ Ttl *f64 In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.java.md b/docs/adSecretRole.java.md index 635787f5..d3b1994d 100644 --- a/docs/adSecretRole.java.md +++ b/docs/adSecretRole.java.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -46,7 +46,7 @@ AdSecretRole.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The mount path for the AD backend. | | role | java.lang.String | Name of the role. | | serviceAccountName | java.lang.String | The username/logon name for the service account with which this role will be associated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | In seconds, the default password time-to-live. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ AdSecretRoleConfig.builder() | backend | java.lang.String | The mount path for the AD backend. | | role | java.lang.String | Name of the role. | | serviceAccountName | java.lang.String | The username/logon name for the service account with which this role will be associated. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.Number | In seconds, the default password time-to-live. | @@ -1094,7 +1094,7 @@ public java.lang.String getBackend(); The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -1108,7 +1108,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -1122,7 +1122,7 @@ public java.lang.String getServiceAccountName(); The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1134,7 +1134,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1151,7 +1151,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1165,7 +1165,7 @@ public java.lang.Number getTtl(); In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.python.md b/docs/adSecretRole.python.md index 0133da7e..1ef8655c 100644 --- a/docs/adSecretRole.python.md +++ b/docs/adSecretRole.python.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -44,7 +44,7 @@ adSecretRole.AdSecretRole( | backend | str | The mount path for the AD backend. | | role | str | Name of the role. | | service_account_name | str | The username/logon name for the service account with which this role will be associated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | In seconds, the default password time-to-live. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1048,7 +1048,7 @@ adSecretRole.AdSecretRoleConfig( | backend | str | The mount path for the AD backend. | | role | str | Name of the role. | | service_account_name | str | The username/logon name for the service account with which this role will be associated. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | typing.Union[int, float] | In seconds, the default password time-to-live. | @@ -1134,7 +1134,7 @@ backend: str The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -1148,7 +1148,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -1162,7 +1162,7 @@ service_account_name: str The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -1174,7 +1174,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1191,7 +1191,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1205,7 +1205,7 @@ ttl: typing.Union[int, float] In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/adSecretRole.typescript.md b/docs/adSecretRole.typescript.md index bdd1519a..a64967e4 100644 --- a/docs/adSecretRole.typescript.md +++ b/docs/adSecretRole.typescript.md @@ -4,7 +4,7 @@ ### AdSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role vault_ad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role vault_ad_secret_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AdSecretRole to import. The id of the existing AdSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -861,7 +861,7 @@ const adSecretRoleConfig: adSecretRole.AdSecretRoleConfig = { ... } | backend | string | The mount path for the AD backend. | | role | string | Name of the role. | | serviceAccountName | string | The username/logon name for the service account with which this role will be associated. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | number | In seconds, the default password time-to-live. | @@ -947,7 +947,7 @@ public readonly backend: string; The mount path for the AD backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#backend AdSecretRole#backend} --- @@ -961,7 +961,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#role AdSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#role AdSecretRole#role} --- @@ -975,7 +975,7 @@ public readonly serviceAccountName: string; The username/logon name for the service account with which this role will be associated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#service_account_name AdSecretRole#service_account_name} --- @@ -987,7 +987,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#id AdSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#id AdSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#namespace AdSecretRole#namespace} --- @@ -1018,7 +1018,7 @@ public readonly ttl: number; In seconds, the default password time-to-live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ad_secret_role#ttl AdSecretRole#ttl} --- diff --git a/docs/alicloudAuthBackendRole.csharp.md b/docs/alicloudAuthBackendRole.csharp.md index f634a5fb..24f36ebe 100644 --- a/docs/alicloudAuthBackendRole.csharp.md +++ b/docs/alicloudAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1100,7 +1100,7 @@ new AlicloudAuthBackendRoleConfig { | Arn | string | The role's arn. | | Role | string | Name of the role. Must correspond with the name of the role reflected in the arn. | | Backend | string | Auth backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1194,7 +1194,7 @@ public string Arn { get; set; } The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1208,7 +1208,7 @@ public string Role { get; set; } Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1222,7 +1222,7 @@ public string Backend { get; set; } Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1234,7 +1234,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1251,7 +1251,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1265,7 +1265,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1279,7 +1279,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1293,7 +1293,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1307,7 +1307,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1321,7 +1321,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1335,7 +1335,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1349,7 +1349,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1363,7 +1363,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1377,7 +1377,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.go.md b/docs/alicloudAuthBackendRole.go.md index 6ebdb743..e00a1ba7 100644 --- a/docs/alicloudAuthBackendRole.go.md +++ b/docs/alicloudAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1100,7 +1100,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/alicloudauthbackendro | Arn | *string | The role's arn. | | Role | *string | Name of the role. Must correspond with the name of the role reflected in the arn. | | Backend | *string | Auth backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1194,7 +1194,7 @@ Arn *string The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1208,7 +1208,7 @@ Role *string Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1222,7 +1222,7 @@ Backend *string Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1234,7 +1234,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1251,7 +1251,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1265,7 +1265,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1279,7 +1279,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1293,7 +1293,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1307,7 +1307,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1321,7 +1321,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1335,7 +1335,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1349,7 +1349,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1363,7 +1363,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1377,7 +1377,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.java.md b/docs/alicloudAuthBackendRole.java.md index c01edbec..74b19d5e 100644 --- a/docs/alicloudAuthBackendRole.java.md +++ b/docs/alicloudAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -55,7 +55,7 @@ AlicloudAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | arn | java.lang.String | The role's arn. | | role | java.lang.String | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | java.lang.String | Auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1331,7 +1331,7 @@ AlicloudAuthBackendRoleConfig.builder() | arn | java.lang.String | The role's arn. | | role | java.lang.String | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | java.lang.String | Auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1425,7 +1425,7 @@ public java.lang.String getArn(); The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1439,7 +1439,7 @@ public java.lang.String getRole(); Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1453,7 +1453,7 @@ public java.lang.String getBackend(); Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1465,7 +1465,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1482,7 +1482,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1496,7 +1496,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1510,7 +1510,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1524,7 +1524,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1538,7 +1538,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1552,7 +1552,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1566,7 +1566,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1580,7 +1580,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1594,7 +1594,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1608,7 +1608,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.python.md b/docs/alicloudAuthBackendRole.python.md index f216e879..a65473c6 100644 --- a/docs/alicloudAuthBackendRole.python.md +++ b/docs/alicloudAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -52,7 +52,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRole( | arn | str | The role's arn. | | role | str | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | str | Auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- @@ -820,7 +820,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1369,7 +1369,7 @@ alicloudAuthBackendRole.AlicloudAuthBackendRoleConfig( | arn | str | The role's arn. | | role | str | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | str | Auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1463,7 +1463,7 @@ arn: str The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1477,7 +1477,7 @@ role: str Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1491,7 +1491,7 @@ backend: str Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1503,7 +1503,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1520,7 +1520,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1534,7 +1534,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1548,7 +1548,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1562,7 +1562,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1576,7 +1576,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1590,7 +1590,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1604,7 +1604,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1618,7 +1618,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1632,7 +1632,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1646,7 +1646,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/alicloudAuthBackendRole.typescript.md b/docs/alicloudAuthBackendRole.typescript.md index 8d156945..4543c63d 100644 --- a/docs/alicloudAuthBackendRole.typescript.md +++ b/docs/alicloudAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AlicloudAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role vault_alicloud_auth_backend_role}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AlicloudAuthBackendRole to The id of the existing AlicloudAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1078,7 +1078,7 @@ const alicloudAuthBackendRoleConfig: alicloudAuthBackendRole.AlicloudAuthBackend | arn | string | The role's arn. | | role | string | Name of the role. Must correspond with the name of the role reflected in the arn. | | backend | string | Auth backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1172,7 +1172,7 @@ public readonly arn: string; The role's arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#arn AlicloudAuthBackendRole#arn} --- @@ -1186,7 +1186,7 @@ public readonly role: string; Name of the role. Must correspond with the name of the role reflected in the arn. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#role AlicloudAuthBackendRole#role} --- @@ -1200,7 +1200,7 @@ public readonly backend: string; Auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#backend AlicloudAuthBackendRole#backend} --- @@ -1212,7 +1212,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#id AlicloudAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1229,7 +1229,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#namespace AlicloudAuthBackendRole#namespace} --- @@ -1243,7 +1243,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_bound_cidrs AlicloudAuthBackendRole#token_bound_cidrs} --- @@ -1257,7 +1257,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_explicit_max_ttl AlicloudAuthBackendRole#token_explicit_max_ttl} --- @@ -1271,7 +1271,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_max_ttl AlicloudAuthBackendRole#token_max_ttl} --- @@ -1285,7 +1285,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_no_default_policy AlicloudAuthBackendRole#token_no_default_policy} --- @@ -1299,7 +1299,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_num_uses AlicloudAuthBackendRole#token_num_uses} --- @@ -1313,7 +1313,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_period AlicloudAuthBackendRole#token_period} --- @@ -1327,7 +1327,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_policies AlicloudAuthBackendRole#token_policies} --- @@ -1341,7 +1341,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_ttl AlicloudAuthBackendRole#token_ttl} --- @@ -1355,7 +1355,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/alicloud_auth_backend_role#token_type AlicloudAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendLogin.csharp.md b/docs/approleAuthBackendLogin.csharp.md index a20c1605..4e6da52d 100644 --- a/docs/approleAuthBackendLogin.csharp.md +++ b/docs/approleAuthBackendLogin.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -913,7 +913,7 @@ new ApproleAuthBackendLoginConfig { | Provisioners | object[] | *No description.* | | RoleId | string | The RoleID to log in with. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretId | string | The SecretID to log in with. | @@ -999,7 +999,7 @@ public string RoleId { get; set; } The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1013,7 +1013,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1025,7 +1025,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1042,7 +1042,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1056,7 +1056,7 @@ public string SecretId { get; set; } The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.go.md b/docs/approleAuthBackendLogin.go.md index 5637dbc0..89f8e9c8 100644 --- a/docs/approleAuthBackendLogin.go.md +++ b/docs/approleAuthBackendLogin.go.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -913,7 +913,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendlog | Provisioners | *[]interface{} | *No description.* | | RoleId | *string | The RoleID to log in with. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretId | *string | The SecretID to log in with. | @@ -999,7 +999,7 @@ RoleId *string The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1013,7 +1013,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1025,7 +1025,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1042,7 +1042,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1056,7 +1056,7 @@ SecretId *string The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.java.md b/docs/approleAuthBackendLogin.java.md index 82631d6f..ed66fa75 100644 --- a/docs/approleAuthBackendLogin.java.md +++ b/docs/approleAuthBackendLogin.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -44,7 +44,7 @@ ApproleAuthBackendLogin.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | roleId | java.lang.String | The RoleID to log in with. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to log in with. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1034,7 +1034,7 @@ ApproleAuthBackendLoginConfig.builder() | provisioners | java.util.List | *No description.* | | roleId | java.lang.String | The RoleID to log in with. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretId | java.lang.String | The SecretID to log in with. | @@ -1120,7 +1120,7 @@ public java.lang.String getRoleId(); The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1134,7 +1134,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1146,7 +1146,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1163,7 +1163,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1177,7 +1177,7 @@ public java.lang.String getSecretId(); The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.python.md b/docs/approleAuthBackendLogin.python.md index e0d05e22..de726ab2 100644 --- a/docs/approleAuthBackendLogin.python.md +++ b/docs/approleAuthBackendLogin.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -42,7 +42,7 @@ approleAuthBackendLogin.ApproleAuthBackendLogin( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_id | str | The RoleID to log in with. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to log in with. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ approleAuthBackendLogin.ApproleAuthBackendLoginConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_id | str | The RoleID to log in with. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_id | str | The SecretID to log in with. | @@ -1160,7 +1160,7 @@ role_id: str The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1174,7 +1174,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1186,7 +1186,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1217,7 +1217,7 @@ secret_id: str The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendLogin.typescript.md b/docs/approleAuthBackendLogin.typescript.md index 5ed1eded..6a4d94bb 100644 --- a/docs/approleAuthBackendLogin.typescript.md +++ b/docs/approleAuthBackendLogin.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login vault_approle_auth_backend_login}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the ApproleAuthBackendLogin to The id of the existing ApproleAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ const approleAuthBackendLoginConfig: approleAuthBackendLogin.ApproleAuthBackendL | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleId | string | The RoleID to log in with. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretId | string | The SecretID to log in with. | @@ -986,7 +986,7 @@ public readonly roleId: string; The RoleID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#role_id ApproleAuthBackendLogin#role_id} --- @@ -1000,7 +1000,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#backend ApproleAuthBackendLogin#backend} --- @@ -1012,7 +1012,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#id ApproleAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1029,7 +1029,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#namespace ApproleAuthBackendLogin#namespace} --- @@ -1043,7 +1043,7 @@ public readonly secretId: string; The SecretID to log in with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_login#secret_id ApproleAuthBackendLogin#secret_id} --- diff --git a/docs/approleAuthBackendRole.csharp.md b/docs/approleAuthBackendRole.csharp.md index 6b500ede..c0887798 100644 --- a/docs/approleAuthBackendRole.csharp.md +++ b/docs/approleAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1227,7 +1227,7 @@ new ApproleAuthBackendRoleConfig { | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | | BindSecretId | object | Whether or not to require secret_id to be present when logging in using this AppRole. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RoleId | string | The RoleID of the role. Autogenerated if not set. | | SecretIdBoundCidrs | string[] | List of CIDR blocks that can log in using the AppRole. | @@ -1325,7 +1325,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1339,7 +1339,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1353,7 +1353,7 @@ public object BindSecretId { get; set; } Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1365,7 +1365,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1382,7 +1382,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1396,7 +1396,7 @@ public string RoleId { get; set; } The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1410,7 +1410,7 @@ public string[] SecretIdBoundCidrs { get; set; } List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1440,7 +1440,7 @@ public double SecretIdTtl { get; set; } Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1454,7 +1454,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1468,7 +1468,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1482,7 +1482,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1496,7 +1496,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1510,7 +1510,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1524,7 +1524,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1538,7 +1538,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1552,7 +1552,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1566,7 +1566,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.go.md b/docs/approleAuthBackendRole.go.md index 77ddb439..b05c4aa0 100644 --- a/docs/approleAuthBackendRole.go.md +++ b/docs/approleAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1227,7 +1227,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | | BindSecretId | interface{} | Whether or not to require secret_id to be present when logging in using this AppRole. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RoleId | *string | The RoleID of the role. Autogenerated if not set. | | SecretIdBoundCidrs | *[]*string | List of CIDR blocks that can log in using the AppRole. | @@ -1325,7 +1325,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1339,7 +1339,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1353,7 +1353,7 @@ BindSecretId interface{} Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1365,7 +1365,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1382,7 +1382,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1396,7 +1396,7 @@ RoleId *string The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1410,7 +1410,7 @@ SecretIdBoundCidrs *[]*string List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1426,7 +1426,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1440,7 +1440,7 @@ SecretIdTtl *f64 Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1454,7 +1454,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1468,7 +1468,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1482,7 +1482,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1496,7 +1496,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1510,7 +1510,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1524,7 +1524,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1538,7 +1538,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1552,7 +1552,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1566,7 +1566,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.java.md b/docs/approleAuthBackendRole.java.md index 2600d3f5..f08fa302 100644 --- a/docs/approleAuthBackendRole.java.md +++ b/docs/approleAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -60,7 +60,7 @@ ApproleAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | bindSecretId | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | roleId | java.lang.String | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | java.util.List | List of CIDR blocks that can log in using the AppRole. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -217,7 +217,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- @@ -863,7 +863,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1510,7 +1510,7 @@ ApproleAuthBackendRoleConfig.builder() | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | bindSecretId | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | roleId | java.lang.String | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | java.util.List | List of CIDR blocks that can log in using the AppRole. | @@ -1608,7 +1608,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1622,7 +1622,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1636,7 +1636,7 @@ public java.lang.Object getBindSecretId(); Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1648,7 +1648,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1665,7 +1665,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1679,7 +1679,7 @@ public java.lang.String getRoleId(); The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1693,7 +1693,7 @@ public java.util.List getSecretIdBoundCidrs(); List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1709,7 +1709,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1723,7 +1723,7 @@ public java.lang.Number getSecretIdTtl(); Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1737,7 +1737,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1751,7 +1751,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1765,7 +1765,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1779,7 +1779,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1793,7 +1793,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1807,7 +1807,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1821,7 +1821,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1835,7 +1835,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1849,7 +1849,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.python.md b/docs/approleAuthBackendRole.python.md index 0cc906dd..22caf8a2 100644 --- a/docs/approleAuthBackendRole.python.md +++ b/docs/approleAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -56,7 +56,7 @@ approleAuthBackendRole.ApproleAuthBackendRole( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | bind_secret_id | typing.Union[bool, cdktf.IResolvable] | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | role_id | str | The RoleID of the role. Autogenerated if not set. | | secret_id_bound_cidrs | typing.List[str] | List of CIDR blocks that can log in using the AppRole. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -213,7 +213,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- @@ -905,7 +905,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1546,7 +1546,7 @@ approleAuthBackendRole.ApproleAuthBackendRoleConfig( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | bind_secret_id | typing.Union[bool, cdktf.IResolvable] | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | role_id | str | The RoleID of the role. Autogenerated if not set. | | secret_id_bound_cidrs | typing.List[str] | List of CIDR blocks that can log in using the AppRole. | @@ -1644,7 +1644,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1658,7 +1658,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1672,7 +1672,7 @@ bind_secret_id: typing.Union[bool, IResolvable] Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1684,7 +1684,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1701,7 +1701,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1715,7 +1715,7 @@ role_id: str The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1729,7 +1729,7 @@ secret_id_bound_cidrs: typing.List[str] List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1745,7 +1745,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1759,7 +1759,7 @@ secret_id_ttl: typing.Union[int, float] Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1773,7 +1773,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1787,7 +1787,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1801,7 +1801,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1815,7 +1815,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1829,7 +1829,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1843,7 +1843,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1857,7 +1857,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1871,7 +1871,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1885,7 +1885,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRole.typescript.md b/docs/approleAuthBackendRole.typescript.md index a7d2ac6f..f4ca9dbc 100644 --- a/docs/approleAuthBackendRole.typescript.md +++ b/docs/approleAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role vault_approle_auth_backend_role}. #### Initializers @@ -586,7 +586,7 @@ The construct id used in the generated config for the ApproleAuthBackendRole to The id of the existing ApproleAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1201,7 +1201,7 @@ const approleAuthBackendRoleConfig: approleAuthBackendRole.ApproleAuthBackendRol | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | | bindSecretId | boolean \| cdktf.IResolvable | Whether or not to require secret_id to be present when logging in using this AppRole. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | roleId | string | The RoleID of the role. Autogenerated if not set. | | secretIdBoundCidrs | string[] | List of CIDR blocks that can log in using the AppRole. | @@ -1299,7 +1299,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_name ApproleAuthBackendRole#role_name} --- @@ -1313,7 +1313,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#backend ApproleAuthBackendRole#backend} --- @@ -1327,7 +1327,7 @@ public readonly bindSecretId: boolean | IResolvable; Whether or not to require secret_id to be present when logging in using this AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#bind_secret_id ApproleAuthBackendRole#bind_secret_id} --- @@ -1339,7 +1339,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#id ApproleAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1356,7 +1356,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#namespace ApproleAuthBackendRole#namespace} --- @@ -1370,7 +1370,7 @@ public readonly roleId: string; The RoleID of the role. Autogenerated if not set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#role_id ApproleAuthBackendRole#role_id} --- @@ -1384,7 +1384,7 @@ public readonly secretIdBoundCidrs: string[]; List of CIDR blocks that can log in using the AppRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_bound_cidrs ApproleAuthBackendRole#secret_id_bound_cidrs} --- @@ -1400,7 +1400,7 @@ Number of times which a particular SecretID can be used to fetch a token from th Leaving this unset or setting it to 0 will allow unlimited uses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_num_uses ApproleAuthBackendRole#secret_id_num_uses} --- @@ -1414,7 +1414,7 @@ public readonly secretIdTtl: number; Number of seconds a SecretID remains valid for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#secret_id_ttl ApproleAuthBackendRole#secret_id_ttl} --- @@ -1428,7 +1428,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_bound_cidrs ApproleAuthBackendRole#token_bound_cidrs} --- @@ -1442,7 +1442,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_explicit_max_ttl ApproleAuthBackendRole#token_explicit_max_ttl} --- @@ -1456,7 +1456,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_max_ttl ApproleAuthBackendRole#token_max_ttl} --- @@ -1470,7 +1470,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_no_default_policy ApproleAuthBackendRole#token_no_default_policy} --- @@ -1484,7 +1484,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_num_uses ApproleAuthBackendRole#token_num_uses} --- @@ -1498,7 +1498,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_period ApproleAuthBackendRole#token_period} --- @@ -1512,7 +1512,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_policies ApproleAuthBackendRole#token_policies} --- @@ -1526,7 +1526,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_ttl ApproleAuthBackendRole#token_ttl} --- @@ -1540,7 +1540,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role#token_type ApproleAuthBackendRole#token_type} --- diff --git a/docs/approleAuthBackendRoleSecretId.csharp.md b/docs/approleAuthBackendRoleSecretId.csharp.md index 54571247..a234dbd3 100644 --- a/docs/approleAuthBackendRoleSecretId.csharp.md +++ b/docs/approleAuthBackendRoleSecretId.csharp.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetMetadata | *No description.* | | ResetNamespace | *No description.* | +| ResetNumUses | *No description.* | | ResetSecretId | *No description.* | +| ResetTtl | *No description.* | | ResetWithWrappedAccessor | *No description.* | | ResetWrappingTtl | *No description.* | @@ -402,12 +404,24 @@ private void ResetMetadata() private void ResetNamespace() ``` +##### `ResetNumUses` + +```csharp +private void ResetNumUses() +``` + ##### `ResetSecretId` ```csharp private void ResetSecretId() ``` +##### `ResetTtl` + +```csharp +private void ResetTtl() +``` + ##### `ResetWithWrappedAccessor` ```csharp @@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | IdInput | string | *No description.* | | MetadataInput | string | *No description.* | | NamespaceInput | string | *No description.* | +| NumUsesInput | double | *No description.* | | RoleNameInput | string | *No description.* | | SecretIdInput | string | *No description.* | +| TtlInput | double | *No description.* | | WithWrappedAccessorInput | object | *No description.* | | WrappingTtlInput | string | *No description.* | | Backend | string | *No description.* | @@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Id | string | *No description.* | | Metadata | string | *No description.* | | Namespace | string | *No description.* | +| NumUses | double | *No description.* | | RoleName | string | *No description.* | | SecretId | string | *No description.* | +| Ttl | double | *No description.* | | WithWrappedAccessor | object | *No description.* | | WrappingTtl | string | *No description.* | @@ -799,6 +817,16 @@ public string NamespaceInput { get; } --- +##### `NumUsesInput`Optional + +```csharp +public double NumUsesInput { get; } +``` + +- *Type:* double + +--- + ##### `RoleNameInput`Optional ```csharp @@ -819,6 +847,16 @@ public string SecretIdInput { get; } --- +##### `TtlInput`Optional + +```csharp +public double TtlInput { get; } +``` + +- *Type:* double + +--- + ##### `WithWrappedAccessorInput`Optional ```csharp @@ -889,6 +927,16 @@ public string Namespace { get; } --- +##### `NumUses`Required + +```csharp +public double NumUses { get; } +``` + +- *Type:* double + +--- + ##### `RoleName`Required ```csharp @@ -909,6 +957,16 @@ public string SecretId { get; } --- +##### `Ttl`Required + +```csharp +public double Ttl { get; } +``` + +- *Type:* double + +--- + ##### `WithWrappedAccessor`Required ```csharp @@ -970,7 +1028,9 @@ new ApproleAuthBackendRoleSecretIdConfig { string Id = null, string Metadata = null, string Namespace = null, + double NumUses = null, string SecretId = null, + double Ttl = null, object WithWrappedAccessor = null, string WrappingTtl = null }; @@ -990,10 +1050,12 @@ new ApproleAuthBackendRoleSecretIdConfig { | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | | CidrList | string[] | List of CIDR blocks that can log in using the SecretID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | Metadata | string | JSON-encoded secret data to write. | | Namespace | string | Target namespace. (requires Enterprise). | +| NumUses | double | The number of uses for the secret-id. | | SecretId | string | The SecretID to be managed. If not specified, Vault auto-generates one. | +| Ttl | double | The TTL duration of the SecretID. | | WithWrappedAccessor | object | Use the wrapped secret-id accessor as the id of this resource. | | WrappingTtl | string | The TTL duration of the wrapped SecretID. | @@ -1079,7 +1141,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1093,7 +1155,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1107,7 +1169,7 @@ public string[] CidrList { get; set; } List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1119,7 +1181,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1198,7 @@ public string Metadata { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1150,7 +1212,21 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `NumUses`Optional + +```csharp +public double NumUses { get; set; } +``` + +- *Type:* double + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -1164,7 +1240,21 @@ public string SecretId { get; set; } The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `Ttl`Optional + +```csharp +public double Ttl { get; set; } +``` + +- *Type:* double + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -1180,7 +1270,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1194,7 +1284,7 @@ public string WrappingTtl { get; set; } The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.go.md b/docs/approleAuthBackendRoleSecretId.go.md index 2b786e43..a282c4f9 100644 --- a/docs/approleAuthBackendRoleSecretId.go.md +++ b/docs/approleAuthBackendRoleSecretId.go.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetMetadata | *No description.* | | ResetNamespace | *No description.* | +| ResetNumUses | *No description.* | | ResetSecretId | *No description.* | +| ResetTtl | *No description.* | | ResetWithWrappedAccessor | *No description.* | | ResetWrappingTtl | *No description.* | @@ -402,12 +404,24 @@ func ResetMetadata() func ResetNamespace() ``` +##### `ResetNumUses` + +```go +func ResetNumUses() +``` + ##### `ResetSecretId` ```go func ResetSecretId() ``` +##### `ResetTtl` + +```go +func ResetTtl() +``` + ##### `ResetWithWrappedAccessor` ```go @@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | IdInput | *string | *No description.* | | MetadataInput | *string | *No description.* | | NamespaceInput | *string | *No description.* | +| NumUsesInput | *f64 | *No description.* | | RoleNameInput | *string | *No description.* | | SecretIdInput | *string | *No description.* | +| TtlInput | *f64 | *No description.* | | WithWrappedAccessorInput | interface{} | *No description.* | | WrappingTtlInput | *string | *No description.* | | Backend | *string | *No description.* | @@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Id | *string | *No description.* | | Metadata | *string | *No description.* | | Namespace | *string | *No description.* | +| NumUses | *f64 | *No description.* | | RoleName | *string | *No description.* | | SecretId | *string | *No description.* | +| Ttl | *f64 | *No description.* | | WithWrappedAccessor | interface{} | *No description.* | | WrappingTtl | *string | *No description.* | @@ -799,6 +817,16 @@ func NamespaceInput() *string --- +##### `NumUsesInput`Optional + +```go +func NumUsesInput() *f64 +``` + +- *Type:* *f64 + +--- + ##### `RoleNameInput`Optional ```go @@ -819,6 +847,16 @@ func SecretIdInput() *string --- +##### `TtlInput`Optional + +```go +func TtlInput() *f64 +``` + +- *Type:* *f64 + +--- + ##### `WithWrappedAccessorInput`Optional ```go @@ -889,6 +927,16 @@ func Namespace() *string --- +##### `NumUses`Required + +```go +func NumUses() *f64 +``` + +- *Type:* *f64 + +--- + ##### `RoleName`Required ```go @@ -909,6 +957,16 @@ func SecretId() *string --- +##### `Ttl`Required + +```go +func Ttl() *f64 +``` + +- *Type:* *f64 + +--- + ##### `WithWrappedAccessor`Required ```go @@ -970,7 +1028,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol Id: *string, Metadata: *string, Namespace: *string, + NumUses: *f64, SecretId: *string, + Ttl: *f64, WithWrappedAccessor: interface{}, WrappingTtl: *string, } @@ -990,10 +1050,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/approleauthbackendrol | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | | CidrList | *[]*string | List of CIDR blocks that can log in using the SecretID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | Metadata | *string | JSON-encoded secret data to write. | | Namespace | *string | Target namespace. (requires Enterprise). | +| NumUses | *f64 | The number of uses for the secret-id. | | SecretId | *string | The SecretID to be managed. If not specified, Vault auto-generates one. | +| Ttl | *f64 | The TTL duration of the SecretID. | | WithWrappedAccessor | interface{} | Use the wrapped secret-id accessor as the id of this resource. | | WrappingTtl | *string | The TTL duration of the wrapped SecretID. | @@ -1079,7 +1141,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1093,7 +1155,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1107,7 +1169,7 @@ CidrList *[]*string List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1119,7 +1181,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1198,7 @@ Metadata *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1150,7 +1212,21 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `NumUses`Optional + +```go +NumUses *f64 +``` + +- *Type:* *f64 + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -1164,7 +1240,21 @@ SecretId *string The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `Ttl`Optional + +```go +Ttl *f64 +``` + +- *Type:* *f64 + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -1180,7 +1270,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1194,7 +1284,7 @@ WrappingTtl *string The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.java.md b/docs/approleAuthBackendRoleSecretId.java.md index 98ca5e1c..a7867b46 100644 --- a/docs/approleAuthBackendRoleSecretId.java.md +++ b/docs/approleAuthBackendRoleSecretId.java.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -29,7 +29,9 @@ ApproleAuthBackendRoleSecretId.Builder.create(Construct scope, java.lang.String // .id(java.lang.String) // .metadata(java.lang.String) // .namespace(java.lang.String) +// .numUses(java.lang.Number) // .secretId(java.lang.String) +// .ttl(java.lang.Number) // .withWrappedAccessor(java.lang.Boolean) // .withWrappedAccessor(IResolvable) // .wrappingTtl(java.lang.String) @@ -50,10 +52,12 @@ ApproleAuthBackendRoleSecretId.Builder.create(Construct scope, java.lang.String | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | cidrList | java.util.List | List of CIDR blocks that can log in using the SecretID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | java.lang.String | JSON-encoded secret data to write. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| numUses | java.lang.Number | The number of uses for the secret-id. | | secretId | java.lang.String | The SecretID to be managed. If not specified, Vault auto-generates one. | +| ttl | java.lang.Number | The TTL duration of the SecretID. | | withWrappedAccessor | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use the wrapped secret-id accessor as the id of this resource. | | wrappingTtl | java.lang.String | The TTL duration of the wrapped SecretID. | @@ -125,7 +129,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -135,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -145,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -153,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -176,7 +180,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `numUses`Optional + +- *Type:* java.lang.Number + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -186,7 +200,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `ttl`Optional + +- *Type:* java.lang.Number + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -198,7 +222,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -208,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- @@ -244,7 +268,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetId | *No description.* | | resetMetadata | *No description.* | | resetNamespace | *No description.* | +| resetNumUses | *No description.* | | resetSecretId | *No description.* | +| resetTtl | *No description.* | | resetWithWrappedAccessor | *No description.* | | resetWrappingTtl | *No description.* | @@ -570,12 +596,24 @@ public void resetMetadata() public void resetNamespace() ``` +##### `resetNumUses` + +```java +public void resetNumUses() +``` + ##### `resetSecretId` ```java public void resetSecretId() ``` +##### `resetTtl` + +```java +public void resetTtl() +``` + ##### `resetWithWrappedAccessor` ```java @@ -691,7 +729,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -729,8 +767,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | idInput | java.lang.String | *No description.* | | metadataInput | java.lang.String | *No description.* | | namespaceInput | java.lang.String | *No description.* | +| numUsesInput | java.lang.Number | *No description.* | | roleNameInput | java.lang.String | *No description.* | | secretIdInput | java.lang.String | *No description.* | +| ttlInput | java.lang.Number | *No description.* | | withWrappedAccessorInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | wrappingTtlInput | java.lang.String | *No description.* | | backend | java.lang.String | *No description.* | @@ -738,8 +778,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | id | java.lang.String | *No description.* | | metadata | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | +| numUses | java.lang.Number | *No description.* | | roleName | java.lang.String | *No description.* | | secretId | java.lang.String | *No description.* | +| ttl | java.lang.Number | *No description.* | | withWrappedAccessor | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | wrappingTtl | java.lang.String | *No description.* | @@ -967,6 +1009,16 @@ public java.lang.String getNamespaceInput(); --- +##### `numUsesInput`Optional + +```java +public java.lang.Number getNumUsesInput(); +``` + +- *Type:* java.lang.Number + +--- + ##### `roleNameInput`Optional ```java @@ -987,6 +1039,16 @@ public java.lang.String getSecretIdInput(); --- +##### `ttlInput`Optional + +```java +public java.lang.Number getTtlInput(); +``` + +- *Type:* java.lang.Number + +--- + ##### `withWrappedAccessorInput`Optional ```java @@ -1057,6 +1119,16 @@ public java.lang.String getNamespace(); --- +##### `numUses`Required + +```java +public java.lang.Number getNumUses(); +``` + +- *Type:* java.lang.Number + +--- + ##### `roleName`Required ```java @@ -1077,6 +1149,16 @@ public java.lang.String getSecretId(); --- +##### `ttl`Required + +```java +public java.lang.Number getTtl(); +``` + +- *Type:* java.lang.Number + +--- + ##### `withWrappedAccessor`Required ```java @@ -1142,7 +1224,9 @@ ApproleAuthBackendRoleSecretIdConfig.builder() // .id(java.lang.String) // .metadata(java.lang.String) // .namespace(java.lang.String) +// .numUses(java.lang.Number) // .secretId(java.lang.String) +// .ttl(java.lang.Number) // .withWrappedAccessor(java.lang.Boolean) // .withWrappedAccessor(IResolvable) // .wrappingTtl(java.lang.String) @@ -1163,10 +1247,12 @@ ApproleAuthBackendRoleSecretIdConfig.builder() | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | | cidrList | java.util.List | List of CIDR blocks that can log in using the SecretID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | java.lang.String | JSON-encoded secret data to write. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | +| numUses | java.lang.Number | The number of uses for the secret-id. | | secretId | java.lang.String | The SecretID to be managed. If not specified, Vault auto-generates one. | +| ttl | java.lang.Number | The TTL duration of the SecretID. | | withWrappedAccessor | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use the wrapped secret-id accessor as the id of this resource. | | wrappingTtl | java.lang.String | The TTL duration of the wrapped SecretID. | @@ -1252,7 +1338,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1266,7 +1352,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1280,7 +1366,7 @@ public java.util.List getCidrList(); List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1292,7 +1378,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1309,7 +1395,7 @@ public java.lang.String getMetadata(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1323,7 +1409,21 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `numUses`Optional + +```java +public java.lang.Number getNumUses(); +``` + +- *Type:* java.lang.Number + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -1337,7 +1437,21 @@ public java.lang.String getSecretId(); The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `ttl`Optional + +```java +public java.lang.Number getTtl(); +``` + +- *Type:* java.lang.Number + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -1353,7 +1467,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1367,7 +1481,7 @@ public java.lang.String getWrappingTtl(); The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.python.md b/docs/approleAuthBackendRoleSecretId.python.md index 268d6a66..5d768afb 100644 --- a/docs/approleAuthBackendRoleSecretId.python.md +++ b/docs/approleAuthBackendRoleSecretId.python.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -27,7 +27,9 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretId( id: str = None, metadata: str = None, namespace: str = None, + num_uses: typing.Union[int, float] = None, secret_id: str = None, + ttl: typing.Union[int, float] = None, with_wrapped_accessor: typing.Union[bool, IResolvable] = None, wrapping_ttl: str = None ) @@ -47,10 +49,12 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretId( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | cidr_list | typing.List[str] | List of CIDR blocks that can log in using the SecretID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | str | JSON-encoded secret data to write. | | namespace | str | Target namespace. (requires Enterprise). | +| num_uses | typing.Union[int, float] | The number of uses for the secret-id. | | secret_id | str | The SecretID to be managed. If not specified, Vault auto-generates one. | +| ttl | typing.Union[int, float] | The TTL duration of the SecretID. | | with_wrapped_accessor | typing.Union[bool, cdktf.IResolvable] | Use the wrapped secret-id accessor as the id of this resource. | | wrapping_ttl | str | The TTL duration of the wrapped SecretID. | @@ -122,7 +126,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -132,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -142,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -150,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -173,7 +177,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `num_uses`Optional + +- *Type:* typing.Union[int, float] + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -183,7 +197,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `ttl`Optional + +- *Type:* typing.Union[int, float] + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -195,7 +219,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -205,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- @@ -241,7 +265,9 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_id | *No description.* | | reset_metadata | *No description.* | | reset_namespace | *No description.* | +| reset_num_uses | *No description.* | | reset_secret_id | *No description.* | +| reset_ttl | *No description.* | | reset_with_wrapped_accessor | *No description.* | | reset_wrapping_ttl | *No description.* | @@ -602,12 +628,24 @@ def reset_metadata() -> None def reset_namespace() -> None ``` +##### `reset_num_uses` + +```python +def reset_num_uses() -> None +``` + ##### `reset_secret_id` ```python def reset_secret_id() -> None ``` +##### `reset_ttl` + +```python +def reset_ttl() -> None +``` + ##### `reset_with_wrapped_accessor` ```python @@ -734,7 +772,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -772,8 +810,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | id_input | str | *No description.* | | metadata_input | str | *No description.* | | namespace_input | str | *No description.* | +| num_uses_input | typing.Union[int, float] | *No description.* | | role_name_input | str | *No description.* | | secret_id_input | str | *No description.* | +| ttl_input | typing.Union[int, float] | *No description.* | | with_wrapped_accessor_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | wrapping_ttl_input | str | *No description.* | | backend | str | *No description.* | @@ -781,8 +821,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | id | str | *No description.* | | metadata | str | *No description.* | | namespace | str | *No description.* | +| num_uses | typing.Union[int, float] | *No description.* | | role_name | str | *No description.* | | secret_id | str | *No description.* | +| ttl | typing.Union[int, float] | *No description.* | | with_wrapped_accessor | typing.Union[bool, cdktf.IResolvable] | *No description.* | | wrapping_ttl | str | *No description.* | @@ -1010,6 +1052,16 @@ namespace_input: str --- +##### `num_uses_input`Optional + +```python +num_uses_input: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `role_name_input`Optional ```python @@ -1030,6 +1082,16 @@ secret_id_input: str --- +##### `ttl_input`Optional + +```python +ttl_input: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `with_wrapped_accessor_input`Optional ```python @@ -1100,6 +1162,16 @@ namespace: str --- +##### `num_uses`Required + +```python +num_uses: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `role_name`Required ```python @@ -1120,6 +1192,16 @@ secret_id: str --- +##### `ttl`Required + +```python +ttl: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `with_wrapped_accessor`Required ```python @@ -1181,7 +1263,9 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretIdConfig( id: str = None, metadata: str = None, namespace: str = None, + num_uses: typing.Union[int, float] = None, secret_id: str = None, + ttl: typing.Union[int, float] = None, with_wrapped_accessor: typing.Union[bool, IResolvable] = None, wrapping_ttl: str = None ) @@ -1201,10 +1285,12 @@ approleAuthBackendRoleSecretId.ApproleAuthBackendRoleSecretIdConfig( | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | | cidr_list | typing.List[str] | List of CIDR blocks that can log in using the SecretID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | str | JSON-encoded secret data to write. | | namespace | str | Target namespace. (requires Enterprise). | +| num_uses | typing.Union[int, float] | The number of uses for the secret-id. | | secret_id | str | The SecretID to be managed. If not specified, Vault auto-generates one. | +| ttl | typing.Union[int, float] | The TTL duration of the SecretID. | | with_wrapped_accessor | typing.Union[bool, cdktf.IResolvable] | Use the wrapped secret-id accessor as the id of this resource. | | wrapping_ttl | str | The TTL duration of the wrapped SecretID. | @@ -1290,7 +1376,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1304,7 +1390,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1318,7 +1404,7 @@ cidr_list: typing.List[str] List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1330,7 +1416,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1347,7 +1433,7 @@ metadata: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1361,7 +1447,21 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `num_uses`Optional + +```python +num_uses: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -1375,7 +1475,21 @@ secret_id: str The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `ttl`Optional + +```python +ttl: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -1391,7 +1505,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1405,7 +1519,7 @@ wrapping_ttl: str The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/approleAuthBackendRoleSecretId.typescript.md b/docs/approleAuthBackendRoleSecretId.typescript.md index a9000138..ead9a011 100644 --- a/docs/approleAuthBackendRoleSecretId.typescript.md +++ b/docs/approleAuthBackendRoleSecretId.typescript.md @@ -4,7 +4,7 @@ ### ApproleAuthBackendRoleSecretId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}. #### Initializers @@ -78,7 +78,9 @@ Must be unique amongst siblings in the same scope | resetId | *No description.* | | resetMetadata | *No description.* | | resetNamespace | *No description.* | +| resetNumUses | *No description.* | | resetSecretId | *No description.* | +| resetTtl | *No description.* | | resetWithWrappedAccessor | *No description.* | | resetWrappingTtl | *No description.* | @@ -402,12 +404,24 @@ public resetMetadata(): void public resetNamespace(): void ``` +##### `resetNumUses` + +```typescript +public resetNumUses(): void +``` + ##### `resetSecretId` ```typescript public resetSecretId(): void ``` +##### `resetTtl` + +```typescript +public resetTtl(): void +``` + ##### `resetWithWrappedAccessor` ```typescript @@ -523,7 +537,7 @@ The construct id used in the generated config for the ApproleAuthBackendRoleSecr The id of the existing ApproleAuthBackendRoleSecretId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#import import section} in the documentation of this resource for the id to use --- @@ -561,8 +575,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | idInput | string | *No description.* | | metadataInput | string | *No description.* | | namespaceInput | string | *No description.* | +| numUsesInput | number | *No description.* | | roleNameInput | string | *No description.* | | secretIdInput | string | *No description.* | +| ttlInput | number | *No description.* | | withWrappedAccessorInput | boolean \| cdktf.IResolvable | *No description.* | | wrappingTtlInput | string | *No description.* | | backend | string | *No description.* | @@ -570,8 +586,10 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | id | string | *No description.* | | metadata | string | *No description.* | | namespace | string | *No description.* | +| numUses | number | *No description.* | | roleName | string | *No description.* | | secretId | string | *No description.* | +| ttl | number | *No description.* | | withWrappedAccessor | boolean \| cdktf.IResolvable | *No description.* | | wrappingTtl | string | *No description.* | @@ -799,6 +817,16 @@ public readonly namespaceInput: string; --- +##### `numUsesInput`Optional + +```typescript +public readonly numUsesInput: number; +``` + +- *Type:* number + +--- + ##### `roleNameInput`Optional ```typescript @@ -819,6 +847,16 @@ public readonly secretIdInput: string; --- +##### `ttlInput`Optional + +```typescript +public readonly ttlInput: number; +``` + +- *Type:* number + +--- + ##### `withWrappedAccessorInput`Optional ```typescript @@ -889,6 +927,16 @@ public readonly namespace: string; --- +##### `numUses`Required + +```typescript +public readonly numUses: number; +``` + +- *Type:* number + +--- + ##### `roleName`Required ```typescript @@ -909,6 +957,16 @@ public readonly secretId: string; --- +##### `ttl`Required + +```typescript +public readonly ttl: number; +``` + +- *Type:* number + +--- + ##### `withWrappedAccessor`Required ```typescript @@ -973,10 +1031,12 @@ const approleAuthBackendRoleSecretIdConfig: approleAuthBackendRoleSecretId.Appro | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | | cidrList | string[] | List of CIDR blocks that can log in using the SecretID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. | | metadata | string | JSON-encoded secret data to write. | | namespace | string | Target namespace. (requires Enterprise). | +| numUses | number | The number of uses for the secret-id. | | secretId | string | The SecretID to be managed. If not specified, Vault auto-generates one. | +| ttl | number | The TTL duration of the SecretID. | | withWrappedAccessor | boolean \| cdktf.IResolvable | Use the wrapped secret-id accessor as the id of this resource. | | wrappingTtl | string | The TTL duration of the wrapped SecretID. | @@ -1062,7 +1122,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} --- @@ -1076,7 +1136,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} --- @@ -1090,7 +1150,7 @@ public readonly cidrList: string[]; List of CIDR blocks that can log in using the SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} --- @@ -1102,7 +1162,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1179,7 @@ public readonly metadata: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} --- @@ -1133,7 +1193,21 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} + +--- + +##### `numUses`Optional + +```typescript +public readonly numUses: number; +``` + +- *Type:* number + +The number of uses for the secret-id. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#num_uses ApproleAuthBackendRoleSecretId#num_uses} --- @@ -1147,7 +1221,21 @@ public readonly secretId: string; The SecretID to be managed. If not specified, Vault auto-generates one. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} + +--- + +##### `ttl`Optional + +```typescript +public readonly ttl: number; +``` + +- *Type:* number + +The TTL duration of the SecretID. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#ttl ApproleAuthBackendRoleSecretId#ttl} --- @@ -1163,7 +1251,7 @@ Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} --- @@ -1177,7 +1265,7 @@ public readonly wrappingTtl: string; The TTL duration of the wrapped SecretID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} --- diff --git a/docs/audit.csharp.md b/docs/audit.csharp.md index 24caff7a..f763a0c8 100644 --- a/docs/audit.csharp.md +++ b/docs/audit.csharp.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new AuditConfig { | Options | System.Collections.Generic.IDictionary | Configuration options to pass to the audit device itself. | | Type | string | Type of the audit device, such as 'file'. | | Description | string | Human-friendly description of the audit device. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | Local | object | Specifies if the audit device is a local only. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path in which to enable the audit device. | @@ -977,7 +977,7 @@ public System.Collections.Generic.IDictionary Options { get; set Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -991,7 +991,7 @@ public string Type { get; set; } Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -1005,7 +1005,7 @@ public string Description { get; set; } Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -1050,7 +1050,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1064,7 +1064,7 @@ public string Path { get; set; } Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.go.md b/docs/audit.go.md index 029c2bab..fa62fb7f 100644 --- a/docs/audit.go.md +++ b/docs/audit.go.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/audit" | Options | *map[string]*string | Configuration options to pass to the audit device itself. | | Type | *string | Type of the audit device, such as 'file'. | | Description | *string | Human-friendly description of the audit device. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | Local | interface{} | Specifies if the audit device is a local only. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path in which to enable the audit device. | @@ -977,7 +977,7 @@ Options *map[string]*string Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -991,7 +991,7 @@ Type *string Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -1005,7 +1005,7 @@ Description *string Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -1050,7 +1050,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1064,7 +1064,7 @@ Path *string Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.java.md b/docs/audit.java.md index edc8cf27..3317cc3f 100644 --- a/docs/audit.java.md +++ b/docs/audit.java.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}. #### Initializers @@ -48,7 +48,7 @@ Audit.Builder.create(Construct scope, java.lang.String id) | options | java.util.Map | Configuration options to pass to the audit device itself. | | type | java.lang.String | Type of the audit device, such as 'file'. | | description | java.lang.String | Human-friendly description of the audit device. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path in which to enable the audit device. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- @@ -646,7 +646,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ AuditConfig.builder() | options | java.util.Map | Configuration options to pass to the audit device itself. | | type | java.lang.String | Type of the audit device, such as 'file'. | | description | java.lang.String | Human-friendly description of the audit device. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path in which to enable the audit device. | @@ -1126,7 +1126,7 @@ public java.util.Map getOptions(); Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -1140,7 +1140,7 @@ public java.lang.String getType(); Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -1154,7 +1154,7 @@ public java.lang.String getDescription(); Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1185,7 +1185,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -1199,7 +1199,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1213,7 +1213,7 @@ public java.lang.String getPath(); Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.python.md b/docs/audit.python.md index d78280f5..e698b790 100644 --- a/docs/audit.python.md +++ b/docs/audit.python.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}. #### Initializers @@ -45,7 +45,7 @@ audit.Audit( | options | typing.Mapping[str] | Configuration options to pass to the audit device itself. | | type | str | Type of the audit device, such as 'file'. | | description | str | Human-friendly description of the audit device. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the audit device is a local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path in which to enable the audit device. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- @@ -689,7 +689,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -1077,7 +1077,7 @@ audit.AuditConfig( | options | typing.Mapping[str] | Configuration options to pass to the audit device itself. | | type | str | Type of the audit device, such as 'file'. | | description | str | Human-friendly description of the audit device. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the audit device is a local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path in which to enable the audit device. | @@ -1164,7 +1164,7 @@ options: typing.Mapping[str] Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -1178,7 +1178,7 @@ type: str Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -1192,7 +1192,7 @@ description: str Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -1204,7 +1204,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1223,7 +1223,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -1237,7 +1237,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1251,7 +1251,7 @@ path: str Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/audit.typescript.md b/docs/audit.typescript.md index 6c5c6dca..651f6d00 100644 --- a/docs/audit.typescript.md +++ b/docs/audit.typescript.md @@ -4,7 +4,7 @@ ### Audit -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit vault_audit}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit vault_audit}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the Audit to import. The id of the existing Audit that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const auditConfig: audit.AuditConfig = { ... } | options | {[ key: string ]: string} | Configuration options to pass to the audit device itself. | | type | string | Type of the audit device, such as 'file'. | | description | string | Human-friendly description of the audit device. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the audit device is a local only. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path in which to enable the audit device. | @@ -962,7 +962,7 @@ public readonly options: {[ key: string ]: string}; Configuration options to pass to the audit device itself. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#options Audit#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#options Audit#options} --- @@ -976,7 +976,7 @@ public readonly type: string; Type of the audit device, such as 'file'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#type Audit#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#type Audit#type} --- @@ -990,7 +990,7 @@ public readonly description: string; Human-friendly description of the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#description Audit#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#description Audit#description} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#id Audit#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#id Audit#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1021,7 +1021,7 @@ Specifies if the audit device is a local only. Local audit devices are not replicated nor (if a secondary) removed by replication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#local Audit#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#local Audit#local} --- @@ -1035,7 +1035,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#namespace Audit#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#namespace Audit#namespace} --- @@ -1049,7 +1049,7 @@ public readonly path: string; Path in which to enable the audit device. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit#path Audit#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit#path Audit#path} --- diff --git a/docs/auditRequestHeader.csharp.md b/docs/auditRequestHeader.csharp.md index e5f6d6fc..d64d46f0 100644 --- a/docs/auditRequestHeader.csharp.md +++ b/docs/auditRequestHeader.csharp.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -806,7 +806,7 @@ new AuditRequestHeaderConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of the request header to audit. | | Hmac | object | Whether this header's value should be HMAC'd in the audit logs. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -891,7 +891,7 @@ public string Name { get; set; } The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -905,7 +905,7 @@ public object Hmac { get; set; } Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -917,7 +917,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -934,7 +934,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.go.md b/docs/auditRequestHeader.go.md index 0333842d..fa73f161 100644 --- a/docs/auditRequestHeader.go.md +++ b/docs/auditRequestHeader.go.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -806,7 +806,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/auditrequestheader" | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the request header to audit. | | Hmac | interface{} | Whether this header's value should be HMAC'd in the audit logs. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -891,7 +891,7 @@ Name *string The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -905,7 +905,7 @@ Hmac interface{} Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -917,7 +917,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -934,7 +934,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.java.md b/docs/auditRequestHeader.java.md index 6d6a3e12..1eb361d7 100644 --- a/docs/auditRequestHeader.java.md +++ b/docs/auditRequestHeader.java.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -44,7 +44,7 @@ AuditRequestHeader.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the request header to audit. | | hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -115,7 +115,7 @@ Must be unique amongst siblings in the same scope The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -146,7 +146,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- @@ -594,7 +594,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -917,7 +917,7 @@ AuditRequestHeaderConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the request header to audit. | | hmac | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1002,7 +1002,7 @@ public java.lang.String getName(); The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -1016,7 +1016,7 @@ public java.lang.Object getHmac(); Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -1028,7 +1028,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1045,7 +1045,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.python.md b/docs/auditRequestHeader.python.md index 629b06f3..f1da1401 100644 --- a/docs/auditRequestHeader.python.md +++ b/docs/auditRequestHeader.python.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -41,7 +41,7 @@ auditRequestHeader.AuditRequestHeader( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the request header to audit. | | hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- @@ -637,7 +637,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -955,7 +955,7 @@ auditRequestHeader.AuditRequestHeaderConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the request header to audit. | | hmac | typing.Union[bool, cdktf.IResolvable] | Whether this header's value should be HMAC'd in the audit logs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1040,7 +1040,7 @@ name: str The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -1054,7 +1054,7 @@ hmac: typing.Union[bool, IResolvable] Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -1066,7 +1066,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1083,7 +1083,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/auditRequestHeader.typescript.md b/docs/auditRequestHeader.typescript.md index 3cf7a3e4..3d55f580 100644 --- a/docs/auditRequestHeader.typescript.md +++ b/docs/auditRequestHeader.typescript.md @@ -4,7 +4,7 @@ ### AuditRequestHeader -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header vault_audit_request_header}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header vault_audit_request_header}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AuditRequestHeader to impo The id of the existing AuditRequestHeader that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#import import section} in the documentation of this resource for the id to use --- @@ -794,7 +794,7 @@ const auditRequestHeaderConfig: auditRequestHeader.AuditRequestHeaderConfig = { | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the request header to audit. | | hmac | boolean \| cdktf.IResolvable | Whether this header's value should be HMAC'd in the audit logs. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -879,7 +879,7 @@ public readonly name: string; The name of the request header to audit. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#name AuditRequestHeader#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#name AuditRequestHeader#name} --- @@ -893,7 +893,7 @@ public readonly hmac: boolean | IResolvable; Whether this header's value should be HMAC'd in the audit logs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#hmac AuditRequestHeader#hmac} --- @@ -905,7 +905,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#id AuditRequestHeader#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -922,7 +922,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/audit_request_header#namespace AuditRequestHeader#namespace} --- diff --git a/docs/authBackend.csharp.md b/docs/authBackend.csharp.md index 15313275..b6c8a139 100644 --- a/docs/authBackend.csharp.md +++ b/docs/authBackend.csharp.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -981,12 +981,12 @@ new AuthBackendConfig { | Type | string | Name of the auth backend. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | Local | object | Specifies if the auth method is local only. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | path to mount the backend. This defaults to the type. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1070,7 +1070,7 @@ public string Type { get; set; } Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1084,7 +1084,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1098,7 +1098,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1110,7 +1110,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -1141,7 +1141,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1155,7 +1155,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1169,7 +1169,7 @@ public string Path { get; set; } path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1181,7 +1181,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1208,14 +1208,14 @@ new AuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1227,7 +1227,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1239,7 +1239,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1251,7 +1251,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1263,7 +1263,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1275,7 +1275,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1287,7 +1287,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1299,7 +1299,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1311,7 +1311,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.go.md b/docs/authBackend.go.md index 1dbec011..0d1de4b8 100644 --- a/docs/authBackend.go.md +++ b/docs/authBackend.go.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -981,12 +981,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" | Type | *string | Name of the auth backend. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | Local | interface{} | Specifies if the auth method is local only. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | path to mount the backend. This defaults to the type. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1070,7 +1070,7 @@ Type *string Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1084,7 +1084,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1098,7 +1098,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1110,7 +1110,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -1141,7 +1141,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1155,7 +1155,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1169,7 +1169,7 @@ Path *string path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1181,7 +1181,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1208,14 +1208,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/authbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1227,7 +1227,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1239,7 +1239,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1251,7 +1251,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1263,7 +1263,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1275,7 +1275,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1287,7 +1287,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1299,7 +1299,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1311,7 +1311,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.java.md b/docs/authBackend.java.md index 1e5fac8a..ce942a0e 100644 --- a/docs/authBackend.java.md +++ b/docs/authBackend.java.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -52,12 +52,12 @@ AuthBackend.Builder.create(Construct scope, java.lang.String id) | type | java.lang.String | Name of the auth backend. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. This defaults to the type. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -127,7 +127,7 @@ Must be unique amongst siblings in the same scope Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -168,7 +168,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -702,7 +702,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1154,12 +1154,12 @@ AuthBackendConfig.builder() | type | java.lang.String | Name of the auth backend. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. This defaults to the type. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1243,7 +1243,7 @@ public java.lang.String getType(); Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1257,7 +1257,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1271,7 +1271,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1283,7 +1283,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1300,7 +1300,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -1314,7 +1314,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1328,7 +1328,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1342,7 +1342,7 @@ public java.lang.String getPath(); path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1354,7 +1354,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<AuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1381,14 +1381,14 @@ AuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1400,7 +1400,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1412,7 +1412,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1424,7 +1424,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1436,7 +1436,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1448,7 +1448,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1460,7 +1460,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1472,7 +1472,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1484,7 +1484,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.python.md b/docs/authBackend.python.md index 32a36a40..28e97185 100644 --- a/docs/authBackend.python.md +++ b/docs/authBackend.python.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -47,12 +47,12 @@ authBackend.AuthBackend( | type | str | Name of the auth backend. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | identity_token_key | str | The key to use for signing identity tokens. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. This defaults to the type. | -| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -745,7 +745,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1190,12 +1190,12 @@ authBackend.AuthBackendConfig( | type | str | Name of the auth backend. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | identity_token_key | str | The key to use for signing identity tokens. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. This defaults to the type. | -| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1279,7 +1279,7 @@ type: str Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1293,7 +1293,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1307,7 +1307,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1319,7 +1319,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1336,7 +1336,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -1350,7 +1350,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1364,7 +1364,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1378,7 +1378,7 @@ path: str path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1390,7 +1390,7 @@ tune: typing.Union[IResolvable, typing.List[AuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[AuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1417,14 +1417,14 @@ authBackend.AuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1436,7 +1436,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1448,7 +1448,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1460,7 +1460,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1472,7 +1472,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1484,7 +1484,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1496,7 +1496,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1508,7 +1508,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1520,7 +1520,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/authBackend.typescript.md b/docs/authBackend.typescript.md index 9f48ce30..80af7659 100644 --- a/docs/authBackend.typescript.md +++ b/docs/authBackend.typescript.md @@ -4,7 +4,7 @@ ### AuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend vault_auth_backend}. #### Initializers @@ -536,7 +536,7 @@ The construct id used in the generated config for the AuthBackend to import. The id of the existing AuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -964,12 +964,12 @@ const authBackendConfig: authBackend.AuthBackendConfig = { ... } | type | string | Name of the auth backend. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. | | identityTokenKey | string | The key to use for signing identity tokens. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | path to mount the backend. This defaults to the type. | -| tune | cdktf.IResolvable \| AuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. | +| tune | cdktf.IResolvable \| AuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. | --- @@ -1053,7 +1053,7 @@ public readonly type: string; Name of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#type AuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#type AuthBackend#type} --- @@ -1067,7 +1067,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#description AuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#description AuthBackend#description} --- @@ -1081,7 +1081,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#disable_remount AuthBackend#disable_remount} --- @@ -1093,7 +1093,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#id AuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#id AuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1110,7 +1110,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#identity_token_key AuthBackend#identity_token_key} --- @@ -1124,7 +1124,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#local AuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#local AuthBackend#local} --- @@ -1138,7 +1138,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#namespace AuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#namespace AuthBackend#namespace} --- @@ -1152,7 +1152,7 @@ public readonly path: string; path to mount the backend. This defaults to the type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#path AuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#path AuthBackend#path} --- @@ -1164,7 +1164,7 @@ public readonly tune: IResolvable | AuthBackendTune[]; - *Type:* cdktf.IResolvable | AuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#tune AuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#tune AuthBackend#tune}. --- @@ -1182,14 +1182,14 @@ const authBackendTune: authBackend.AuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. | --- @@ -1201,7 +1201,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#allowed_response_headers AuthBackend#allowed_response_headers}. --- @@ -1213,7 +1213,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_request_keys AuthBackend#audit_non_hmac_request_keys}. --- @@ -1225,7 +1225,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#audit_non_hmac_response_keys AuthBackend#audit_non_hmac_response_keys}. --- @@ -1237,7 +1237,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#default_lease_ttl AuthBackend#default_lease_ttl}. --- @@ -1249,7 +1249,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#listing_visibility AuthBackend#listing_visibility}. --- @@ -1261,7 +1261,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#max_lease_ttl AuthBackend#max_lease_ttl}. --- @@ -1273,7 +1273,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#passthrough_request_headers AuthBackend#passthrough_request_headers}. --- @@ -1285,7 +1285,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/auth_backend#token_type AuthBackend#token_type}. --- diff --git a/docs/awsAuthBackendCert.csharp.md b/docs/awsAuthBackendCert.csharp.md index 7d54d947..241a9cef 100644 --- a/docs/awsAuthBackendCert.csharp.md +++ b/docs/awsAuthBackendCert.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ new AwsAuthBackendCertConfig { | AwsPublicCert | string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | CertName | string | Name of the certificate to configure. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Type | string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -946,7 +946,7 @@ public string AwsPublicCert { get; set; } Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -960,7 +960,7 @@ public string CertName { get; set; } Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -974,7 +974,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1017,7 +1017,7 @@ public string Type { get; set; } The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.go.md b/docs/awsAuthBackendCert.go.md index 4230be9d..ed206e59 100644 --- a/docs/awsAuthBackendCert.go.md +++ b/docs/awsAuthBackendCert.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendcert" | AwsPublicCert | *string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | CertName | *string | Name of the certificate to configure. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Type | *string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -946,7 +946,7 @@ AwsPublicCert *string Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -960,7 +960,7 @@ CertName *string Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -974,7 +974,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1017,7 +1017,7 @@ Type *string The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.java.md b/docs/awsAuthBackendCert.java.md index 04d1d487..f6c8a12a 100644 --- a/docs/awsAuthBackendCert.java.md +++ b/docs/awsAuthBackendCert.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -46,7 +46,7 @@ AwsAuthBackendCert.Builder.create(Construct scope, java.lang.String id) | awsPublicCert | java.lang.String | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | java.lang.String | Name of the certificate to configure. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- @@ -624,7 +624,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -993,7 +993,7 @@ AwsAuthBackendCertConfig.builder() | awsPublicCert | java.lang.String | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | java.lang.String | Name of the certificate to configure. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -1079,7 +1079,7 @@ public java.lang.String getAwsPublicCert(); Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -1093,7 +1093,7 @@ public java.lang.String getCertName(); Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -1107,7 +1107,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1150,7 +1150,7 @@ public java.lang.String getType(); The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.python.md b/docs/awsAuthBackendCert.python.md index 4e57ac6d..0282bfbb 100644 --- a/docs/awsAuthBackendCert.python.md +++ b/docs/awsAuthBackendCert.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -44,7 +44,7 @@ awsAuthBackendCert.AwsAuthBackendCert( | aws_public_cert | str | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | cert_name | str | Name of the certificate to configure. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ awsAuthBackendCert.AwsAuthBackendCertConfig( | aws_public_cert | str | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | cert_name | str | Name of the certificate to configure. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -1119,7 +1119,7 @@ aws_public_cert: str Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -1133,7 +1133,7 @@ cert_name: str Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -1147,7 +1147,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1190,7 +1190,7 @@ type: str The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendCert.typescript.md b/docs/awsAuthBackendCert.typescript.md index a8acfc0a..4366b0b1 100644 --- a/docs/awsAuthBackendCert.typescript.md +++ b/docs/awsAuthBackendCert.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert vault_aws_auth_backend_cert}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendCert to impo The id of the existing AwsAuthBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +846,7 @@ const awsAuthBackendCertConfig: awsAuthBackendCert.AwsAuthBackendCertConfig = { | awsPublicCert | string | Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. | | certName | string | Name of the certificate to configure. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. | | namespace | string | Target namespace. (requires Enterprise). | | type | string | The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". | @@ -932,7 +932,7 @@ public readonly awsPublicCert: string; Base64 encoded AWS Public key required to verify PKCS7 signature of the EC2 instance metadata. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#aws_public_cert AwsAuthBackendCert#aws_public_cert} --- @@ -946,7 +946,7 @@ public readonly certName: string; Name of the certificate to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#cert_name AwsAuthBackendCert#cert_name} --- @@ -960,7 +960,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#backend AwsAuthBackendCert#backend} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#id AwsAuthBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#namespace AwsAuthBackendCert#namespace} --- @@ -1003,7 +1003,7 @@ public readonly type: string; The type of document that can be verified using the certificate. Must be either "pkcs7" or "identity". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_cert#type AwsAuthBackendCert#type} --- diff --git a/docs/awsAuthBackendClient.csharp.md b/docs/awsAuthBackendClient.csharp.md index a2e7e5d0..91f4ce68 100644 --- a/docs/awsAuthBackendClient.csharp.md +++ b/docs/awsAuthBackendClient.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1146,7 +1146,7 @@ new AwsAuthBackendClientConfig { | Ec2Endpoint | string | URL to override the default generated endpoint for making AWS EC2 API calls. | | IamEndpoint | string | URL to override the default generated endpoint for making AWS IAM API calls. | | IamServerIdHeaderValue | string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | IdentityTokenAudience | string | The audience claim value. | | IdentityTokenTtl | double | The TTL of generated identity tokens in seconds. | | MaxRetries | double | Number of max retries the client should use for recoverable errors. | @@ -1239,7 +1239,7 @@ public string AccessKey { get; set; } AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1253,7 +1253,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1267,7 +1267,7 @@ public string Ec2Endpoint { get; set; } URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1281,7 +1281,7 @@ public string IamEndpoint { get; set; } URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1295,7 +1295,7 @@ public string IamServerIdHeaderValue { get; set; } The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1307,7 +1307,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1324,7 +1324,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -1338,7 +1338,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -1352,7 +1352,7 @@ public double MaxRetries { get; set; } Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -1366,7 +1366,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1380,7 +1380,7 @@ public string RoleArn { get; set; } Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -1394,7 +1394,7 @@ public string SecretKey { get; set; } AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1408,7 +1408,7 @@ public string StsEndpoint { get; set; } URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1422,7 +1422,7 @@ public string StsRegion { get; set; } Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1436,7 +1436,7 @@ public object UseStsRegionFromClient { get; set; } If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.go.md b/docs/awsAuthBackendClient.go.md index 15daa160..c1fd3eac 100644 --- a/docs/awsAuthBackendClient.go.md +++ b/docs/awsAuthBackendClient.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1146,7 +1146,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendclient" | Ec2Endpoint | *string | URL to override the default generated endpoint for making AWS EC2 API calls. | | IamEndpoint | *string | URL to override the default generated endpoint for making AWS IAM API calls. | | IamServerIdHeaderValue | *string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | IdentityTokenAudience | *string | The audience claim value. | | IdentityTokenTtl | *f64 | The TTL of generated identity tokens in seconds. | | MaxRetries | *f64 | Number of max retries the client should use for recoverable errors. | @@ -1239,7 +1239,7 @@ AccessKey *string AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1253,7 +1253,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1267,7 +1267,7 @@ Ec2Endpoint *string URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1281,7 +1281,7 @@ IamEndpoint *string URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1295,7 +1295,7 @@ IamServerIdHeaderValue *string The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1307,7 +1307,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1324,7 +1324,7 @@ IdentityTokenAudience *string The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -1338,7 +1338,7 @@ IdentityTokenTtl *f64 The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -1352,7 +1352,7 @@ MaxRetries *f64 Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -1366,7 +1366,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1380,7 +1380,7 @@ RoleArn *string Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -1394,7 +1394,7 @@ SecretKey *string AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1408,7 +1408,7 @@ StsEndpoint *string URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1422,7 +1422,7 @@ StsRegion *string Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1436,7 +1436,7 @@ UseStsRegionFromClient interface{} If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.java.md b/docs/awsAuthBackendClient.java.md index 0bb6a6ec..ef2e8c7f 100644 --- a/docs/awsAuthBackendClient.java.md +++ b/docs/awsAuthBackendClient.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -58,7 +58,7 @@ AwsAuthBackendClient.Builder.create(Construct scope, java.lang.String id) | ec2Endpoint | java.lang.String | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | java.lang.String | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | | maxRetries | java.lang.Number | Number of max retries the client should use for recoverable errors. | @@ -137,7 +137,7 @@ Must be unique amongst siblings in the same scope AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -198,7 +198,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- @@ -810,7 +810,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1389,7 +1389,7 @@ AwsAuthBackendClientConfig.builder() | ec2Endpoint | java.lang.String | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | java.lang.String | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | java.lang.String | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | | maxRetries | java.lang.Number | Number of max retries the client should use for recoverable errors. | @@ -1482,7 +1482,7 @@ public java.lang.String getAccessKey(); AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1496,7 +1496,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1510,7 +1510,7 @@ public java.lang.String getEc2Endpoint(); URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1524,7 +1524,7 @@ public java.lang.String getIamEndpoint(); URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1538,7 +1538,7 @@ public java.lang.String getIamServerIdHeaderValue(); The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1550,7 +1550,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1567,7 +1567,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -1581,7 +1581,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -1595,7 +1595,7 @@ public java.lang.Number getMaxRetries(); Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -1609,7 +1609,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1623,7 +1623,7 @@ public java.lang.String getRoleArn(); Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -1637,7 +1637,7 @@ public java.lang.String getSecretKey(); AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1651,7 +1651,7 @@ public java.lang.String getStsEndpoint(); URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1665,7 +1665,7 @@ public java.lang.String getStsRegion(); Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1679,7 +1679,7 @@ public java.lang.Object getUseStsRegionFromClient(); If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.python.md b/docs/awsAuthBackendClient.python.md index 27d05f6d..868c8faf 100644 --- a/docs/awsAuthBackendClient.python.md +++ b/docs/awsAuthBackendClient.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -55,7 +55,7 @@ awsAuthBackendClient.AwsAuthBackendClient( | ec2_endpoint | str | URL to override the default generated endpoint for making AWS EC2 API calls. | | iam_endpoint | str | URL to override the default generated endpoint for making AWS IAM API calls. | | iam_server_id_header_value | str | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | | max_retries | typing.Union[int, float] | Number of max retries the client should use for recoverable errors. | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -195,7 +195,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- @@ -853,7 +853,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1427,7 +1427,7 @@ awsAuthBackendClient.AwsAuthBackendClientConfig( | ec2_endpoint | str | URL to override the default generated endpoint for making AWS EC2 API calls. | | iam_endpoint | str | URL to override the default generated endpoint for making AWS IAM API calls. | | iam_server_id_header_value | str | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | | max_retries | typing.Union[int, float] | Number of max retries the client should use for recoverable errors. | @@ -1520,7 +1520,7 @@ access_key: str AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1534,7 +1534,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1548,7 +1548,7 @@ ec2_endpoint: str URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1562,7 +1562,7 @@ iam_endpoint: str URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1576,7 +1576,7 @@ iam_server_id_header_value: str The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1588,7 +1588,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1605,7 +1605,7 @@ identity_token_audience: str The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -1619,7 +1619,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -1633,7 +1633,7 @@ max_retries: typing.Union[int, float] Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -1647,7 +1647,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1661,7 +1661,7 @@ role_arn: str Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -1675,7 +1675,7 @@ secret_key: str AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1689,7 +1689,7 @@ sts_endpoint: str URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1703,7 +1703,7 @@ sts_region: str Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1717,7 +1717,7 @@ use_sts_region_from_client: typing.Union[bool, IResolvable] If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendClient.typescript.md b/docs/awsAuthBackendClient.typescript.md index dde2336c..34b79c80 100644 --- a/docs/awsAuthBackendClient.typescript.md +++ b/docs/awsAuthBackendClient.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client vault_aws_auth_backend_client}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the AwsAuthBackendClient to im The id of the existing AwsAuthBackendClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#import import section} in the documentation of this resource for the id to use --- @@ -1123,7 +1123,7 @@ const awsAuthBackendClientConfig: awsAuthBackendClient.AwsAuthBackendClientConfi | ec2Endpoint | string | URL to override the default generated endpoint for making AWS EC2 API calls. | | iamEndpoint | string | URL to override the default generated endpoint for making AWS IAM API calls. | | iamServerIdHeaderValue | string | The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. | | identityTokenAudience | string | The audience claim value. | | identityTokenTtl | number | The TTL of generated identity tokens in seconds. | | maxRetries | number | Number of max retries the client should use for recoverable errors. | @@ -1216,7 +1216,7 @@ public readonly accessKey: string; AWS Access key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#access_key AwsAuthBackendClient#access_key} --- @@ -1230,7 +1230,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#backend AwsAuthBackendClient#backend} --- @@ -1244,7 +1244,7 @@ public readonly ec2Endpoint: string; URL to override the default generated endpoint for making AWS EC2 API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#ec2_endpoint AwsAuthBackendClient#ec2_endpoint} --- @@ -1258,7 +1258,7 @@ public readonly iamEndpoint: string; URL to override the default generated endpoint for making AWS IAM API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_endpoint AwsAuthBackendClient#iam_endpoint} --- @@ -1272,7 +1272,7 @@ public readonly iamServerIdHeaderValue: string; The value to require in the X-Vault-AWS-IAM-Server-ID header as part of GetCallerIdentity requests that are used in the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#iam_server_id_header_value AwsAuthBackendClient#iam_server_id_header_value} --- @@ -1284,7 +1284,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#id AwsAuthBackendClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1301,7 +1301,7 @@ public readonly identityTokenAudience: string; The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_audience AwsAuthBackendClient#identity_token_audience} --- @@ -1315,7 +1315,7 @@ public readonly identityTokenTtl: number; The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#identity_token_ttl AwsAuthBackendClient#identity_token_ttl} --- @@ -1329,7 +1329,7 @@ public readonly maxRetries: number; Number of max retries the client should use for recoverable errors. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#max_retries AwsAuthBackendClient#max_retries} --- @@ -1343,7 +1343,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#namespace AwsAuthBackendClient#namespace} --- @@ -1357,7 +1357,7 @@ public readonly roleArn: string; Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#role_arn AwsAuthBackendClient#role_arn} --- @@ -1371,7 +1371,7 @@ public readonly secretKey: string; AWS Secret key with permissions to query AWS APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#secret_key AwsAuthBackendClient#secret_key} --- @@ -1385,7 +1385,7 @@ public readonly stsEndpoint: string; URL to override the default generated endpoint for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_endpoint AwsAuthBackendClient#sts_endpoint} --- @@ -1399,7 +1399,7 @@ public readonly stsRegion: string; Region to override the default region for making AWS STS API calls. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#sts_region AwsAuthBackendClient#sts_region} --- @@ -1413,7 +1413,7 @@ public readonly useStsRegionFromClient: boolean | IResolvable; If set, will override sts_region and use the region from the client request's header. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_client#use_sts_region_from_client AwsAuthBackendClient#use_sts_region_from_client} --- diff --git a/docs/awsAuthBackendConfigIdentity.csharp.md b/docs/awsAuthBackendConfigIdentity.csharp.md index 22bf4e47..81fab49e 100644 --- a/docs/awsAuthBackendConfigIdentity.csharp.md +++ b/docs/awsAuthBackendConfigIdentity.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -906,7 +906,7 @@ new AwsAuthBackendConfigIdentityConfig { | Ec2Metadata | string[] | The metadata to include on the token returned by the login endpoint. | | IamAlias | string | How to generate the identity alias when using the iam auth method. | | IamMetadata | string[] | The metadata to include on the token returned by the login endpoint. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -991,7 +991,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1005,7 +1005,7 @@ public string Ec2Alias { get; set; } Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1019,7 +1019,7 @@ public string[] Ec2Metadata { get; set; } The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1033,7 +1033,7 @@ public string IamAlias { get; set; } How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1047,7 +1047,7 @@ public string[] IamMetadata { get; set; } The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1059,7 +1059,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.go.md b/docs/awsAuthBackendConfigIdentity.go.md index faf0ff5b..ce57f965 100644 --- a/docs/awsAuthBackendConfigIdentity.go.md +++ b/docs/awsAuthBackendConfigIdentity.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -906,7 +906,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendconfigi | Ec2Metadata | *[]*string | The metadata to include on the token returned by the login endpoint. | | IamAlias | *string | How to generate the identity alias when using the iam auth method. | | IamMetadata | *[]*string | The metadata to include on the token returned by the login endpoint. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -991,7 +991,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1005,7 +1005,7 @@ Ec2Alias *string Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1019,7 +1019,7 @@ Ec2Metadata *[]*string The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1033,7 +1033,7 @@ IamAlias *string How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1047,7 +1047,7 @@ IamMetadata *[]*string The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1059,7 +1059,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.java.md b/docs/awsAuthBackendConfigIdentity.java.md index 144837ff..a97d7fd7 100644 --- a/docs/awsAuthBackendConfigIdentity.java.md +++ b/docs/awsAuthBackendConfigIdentity.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -49,7 +49,7 @@ AwsAuthBackendConfigIdentity.Builder.create(Construct scope, java.lang.String id | ec2Metadata | java.util.List | The metadata to include on the token returned by the login endpoint. | | iamAlias | java.lang.String | How to generate the identity alias when using the iam auth method. | | iamMetadata | java.util.List | The metadata to include on the token returned by the login endpoint. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- @@ -657,7 +657,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -1051,7 +1051,7 @@ AwsAuthBackendConfigIdentityConfig.builder() | ec2Metadata | java.util.List | The metadata to include on the token returned by the login endpoint. | | iamAlias | java.lang.String | How to generate the identity alias when using the iam auth method. | | iamMetadata | java.util.List | The metadata to include on the token returned by the login endpoint. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1136,7 +1136,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1150,7 +1150,7 @@ public java.lang.String getEc2Alias(); Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1164,7 +1164,7 @@ public java.util.List getEc2Metadata(); The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1178,7 +1178,7 @@ public java.lang.String getIamAlias(); How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1192,7 +1192,7 @@ public java.util.List getIamMetadata(); The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1204,7 +1204,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1221,7 +1221,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.python.md b/docs/awsAuthBackendConfigIdentity.python.md index 414f4887..b131cfcb 100644 --- a/docs/awsAuthBackendConfigIdentity.python.md +++ b/docs/awsAuthBackendConfigIdentity.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -47,7 +47,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentity( | ec2_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | | iam_alias | str | How to generate the identity alias when using the iam auth method. | | iam_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -1091,7 +1091,7 @@ awsAuthBackendConfigIdentity.AwsAuthBackendConfigIdentityConfig( | ec2_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | | iam_alias | str | How to generate the identity alias when using the iam auth method. | | iam_metadata | typing.List[str] | The metadata to include on the token returned by the login endpoint. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1176,7 +1176,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -1190,7 +1190,7 @@ ec2_alias: str Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1204,7 +1204,7 @@ ec2_metadata: typing.List[str] The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1218,7 +1218,7 @@ iam_alias: str How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1232,7 +1232,7 @@ iam_metadata: typing.List[str] The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1244,7 +1244,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1261,7 +1261,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendConfigIdentity.typescript.md b/docs/awsAuthBackendConfigIdentity.typescript.md index 77ebb4cd..47ec49b4 100644 --- a/docs/awsAuthBackendConfigIdentity.typescript.md +++ b/docs/awsAuthBackendConfigIdentity.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendConfigIdentity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity vault_aws_auth_backend_config_identity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the AwsAuthBackendConfigIdenti The id of the existing AwsAuthBackendConfigIdentity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#import import section} in the documentation of this resource for the id to use --- @@ -891,7 +891,7 @@ const awsAuthBackendConfigIdentityConfig: awsAuthBackendConfigIdentity.AwsAuthBa | ec2Metadata | string[] | The metadata to include on the token returned by the login endpoint. | | iamAlias | string | How to generate the identity alias when using the iam auth method. | | iamMetadata | string[] | The metadata to include on the token returned by the login endpoint. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -976,7 +976,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#backend AwsAuthBackendConfigIdentity#backend} --- @@ -990,7 +990,7 @@ public readonly ec2Alias: string; Configures how to generate the identity alias when using the ec2 auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_alias AwsAuthBackendConfigIdentity#ec2_alias} --- @@ -1004,7 +1004,7 @@ public readonly ec2Metadata: string[]; The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#ec2_metadata AwsAuthBackendConfigIdentity#ec2_metadata} --- @@ -1018,7 +1018,7 @@ public readonly iamAlias: string; How to generate the identity alias when using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_alias AwsAuthBackendConfigIdentity#iam_alias} --- @@ -1032,7 +1032,7 @@ public readonly iamMetadata: string[]; The metadata to include on the token returned by the login endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#iam_metadata AwsAuthBackendConfigIdentity#iam_metadata} --- @@ -1044,7 +1044,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#id AwsAuthBackendConfigIdentity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1061,7 +1061,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_config_identity#namespace AwsAuthBackendConfigIdentity#namespace} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.csharp.md b/docs/awsAuthBackendIdentityWhitelist.csharp.md index bff85ae1..bb9c78b0 100644 --- a/docs/awsAuthBackendIdentityWhitelist.csharp.md +++ b/docs/awsAuthBackendIdentityWhitelist.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -843,7 +843,7 @@ new AwsAuthBackendIdentityWhitelistConfig { | Provisioners | object[] | *No description.* | | Backend | string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | object | If true, disables the periodic tidying of the identiy whitelist entries. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SafetyBuffer | double | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -929,7 +929,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -943,7 +943,7 @@ public object DisablePeriodicTidy { get; set; } If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -986,7 +986,7 @@ public double SafetyBuffer { get; set; } The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.go.md b/docs/awsAuthBackendIdentityWhitelist.go.md index ed3c9c0b..77d6f939 100644 --- a/docs/awsAuthBackendIdentityWhitelist.go.md +++ b/docs/awsAuthBackendIdentityWhitelist.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -843,7 +843,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendidentit | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | interface{} | If true, disables the periodic tidying of the identiy whitelist entries. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SafetyBuffer | *f64 | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -929,7 +929,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -943,7 +943,7 @@ DisablePeriodicTidy interface{} If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -986,7 +986,7 @@ SafetyBuffer *f64 The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.java.md b/docs/awsAuthBackendIdentityWhitelist.java.md index 5c8cc940..fbc8e3aa 100644 --- a/docs/awsAuthBackendIdentityWhitelist.java.md +++ b/docs/awsAuthBackendIdentityWhitelist.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendIdentityWhitelist.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- @@ -620,7 +620,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -966,7 +966,7 @@ AwsAuthBackendIdentityWhitelistConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1052,7 +1052,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -1066,7 +1066,7 @@ public java.lang.Object getDisablePeriodicTidy(); If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -1078,7 +1078,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1095,7 +1095,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -1109,7 +1109,7 @@ public java.lang.Number getSafetyBuffer(); The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.python.md b/docs/awsAuthBackendIdentityWhitelist.python.md index ddee13d2..fa952275 100644 --- a/docs/awsAuthBackendIdentityWhitelist.python.md +++ b/docs/awsAuthBackendIdentityWhitelist.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -42,7 +42,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelist( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -1004,7 +1004,7 @@ awsAuthBackendIdentityWhitelist.AwsAuthBackendIdentityWhitelistConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1090,7 +1090,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -1104,7 +1104,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable] If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -1147,7 +1147,7 @@ safety_buffer: typing.Union[int, float] The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendIdentityWhitelist.typescript.md b/docs/awsAuthBackendIdentityWhitelist.typescript.md index 9329da25..c3ca55cc 100644 --- a/docs/awsAuthBackendIdentityWhitelist.typescript.md +++ b/docs/awsAuthBackendIdentityWhitelist.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendIdentityWhitelist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist vault_aws_auth_backend_identity_whitelist}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the AwsAuthBackendIdentityWhit The id of the existing AwsAuthBackendIdentityWhitelist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ const awsAuthBackendIdentityWhitelistConfig: awsAuthBackendIdentityWhitelist.Aws | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Unique name of the auth backend to configure. | | disablePeriodicTidy | boolean \| cdktf.IResolvable | If true, disables the periodic tidying of the identiy whitelist entries. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. | | namespace | string | Target namespace. (requires Enterprise). | | safetyBuffer | number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -916,7 +916,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#backend AwsAuthBackendIdentityWhitelist#backend} --- @@ -930,7 +930,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable; If true, disables the periodic tidying of the identiy whitelist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#disable_periodic_tidy AwsAuthBackendIdentityWhitelist#disable_periodic_tidy} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#id AwsAuthBackendIdentityWhitelist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#namespace AwsAuthBackendIdentityWhitelist#namespace} --- @@ -973,7 +973,7 @@ public readonly safetyBuffer: number; The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_identity_whitelist#safety_buffer AwsAuthBackendIdentityWhitelist#safety_buffer} --- diff --git a/docs/awsAuthBackendLogin.csharp.md b/docs/awsAuthBackendLogin.csharp.md index 5921af9c..e9603480 100644 --- a/docs/awsAuthBackendLogin.csharp.md +++ b/docs/awsAuthBackendLogin.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1144,7 +1144,7 @@ new AwsAuthBackendLoginConfig { | IamRequestBody | string | The Base64-encoded body of the signed request. | | IamRequestHeaders | string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | IamRequestUrl | string | The Base64-encoded HTTP URL used in the signed request. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | Identity | string | Base64-encoded EC2 instance identity document to authenticate with. | | Namespace | string | Target namespace. (requires Enterprise). | | Nonce | string | The nonce to be used for subsequent login requests. | @@ -1234,7 +1234,7 @@ public string Backend { get; set; } AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1248,7 +1248,7 @@ public string IamHttpRequestMethod { get; set; } The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1262,7 +1262,7 @@ public string IamRequestBody { get; set; } The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1276,7 +1276,7 @@ public string IamRequestHeaders { get; set; } The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1290,7 +1290,7 @@ public string IamRequestUrl { get; set; } The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1302,7 +1302,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1319,7 +1319,7 @@ public string Identity { get; set; } Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1333,7 +1333,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1347,7 +1347,7 @@ public string Nonce { get; set; } The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1361,7 +1361,7 @@ public string Pkcs7 { get; set; } PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1375,7 +1375,7 @@ public string Role { get; set; } AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1389,7 +1389,7 @@ public string Signature { get; set; } Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.go.md b/docs/awsAuthBackendLogin.go.md index 8ba90c11..b522ea9a 100644 --- a/docs/awsAuthBackendLogin.go.md +++ b/docs/awsAuthBackendLogin.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1144,7 +1144,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendlogin" | IamRequestBody | *string | The Base64-encoded body of the signed request. | | IamRequestHeaders | *string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | IamRequestUrl | *string | The Base64-encoded HTTP URL used in the signed request. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | Identity | *string | Base64-encoded EC2 instance identity document to authenticate with. | | Namespace | *string | Target namespace. (requires Enterprise). | | Nonce | *string | The nonce to be used for subsequent login requests. | @@ -1234,7 +1234,7 @@ Backend *string AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1248,7 +1248,7 @@ IamHttpRequestMethod *string The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1262,7 +1262,7 @@ IamRequestBody *string The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1276,7 +1276,7 @@ IamRequestHeaders *string The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1290,7 +1290,7 @@ IamRequestUrl *string The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1302,7 +1302,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1319,7 +1319,7 @@ Identity *string Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1333,7 +1333,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1347,7 +1347,7 @@ Nonce *string The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1361,7 +1361,7 @@ Pkcs7 *string PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1375,7 +1375,7 @@ Role *string AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1389,7 +1389,7 @@ Signature *string Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.java.md b/docs/awsAuthBackendLogin.java.md index 10bacdd6..08275921 100644 --- a/docs/awsAuthBackendLogin.java.md +++ b/docs/awsAuthBackendLogin.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -54,7 +54,7 @@ AwsAuthBackendLogin.Builder.create(Construct scope, java.lang.String id) | iamRequestBody | java.lang.String | The Base64-encoded body of the signed request. | | iamRequestHeaders | java.lang.String | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | java.lang.String | The Base64-encoded HTTP URL used in the signed request. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | java.lang.String | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | nonce | java.lang.String | The nonce to be used for subsequent login requests. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- @@ -752,7 +752,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1349,7 +1349,7 @@ AwsAuthBackendLoginConfig.builder() | iamRequestBody | java.lang.String | The Base64-encoded body of the signed request. | | iamRequestHeaders | java.lang.String | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | java.lang.String | The Base64-encoded HTTP URL used in the signed request. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | java.lang.String | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | nonce | java.lang.String | The nonce to be used for subsequent login requests. | @@ -1439,7 +1439,7 @@ public java.lang.String getBackend(); AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1453,7 +1453,7 @@ public java.lang.String getIamHttpRequestMethod(); The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1467,7 +1467,7 @@ public java.lang.String getIamRequestBody(); The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1481,7 +1481,7 @@ public java.lang.String getIamRequestHeaders(); The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1495,7 +1495,7 @@ public java.lang.String getIamRequestUrl(); The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1507,7 +1507,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1524,7 +1524,7 @@ public java.lang.String getIdentity(); Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1538,7 +1538,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1552,7 +1552,7 @@ public java.lang.String getNonce(); The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1566,7 +1566,7 @@ public java.lang.String getPkcs7(); PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1580,7 +1580,7 @@ public java.lang.String getRole(); AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1594,7 +1594,7 @@ public java.lang.String getSignature(); Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.python.md b/docs/awsAuthBackendLogin.python.md index ba2df055..d4d03802 100644 --- a/docs/awsAuthBackendLogin.python.md +++ b/docs/awsAuthBackendLogin.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -52,7 +52,7 @@ awsAuthBackendLogin.AwsAuthBackendLogin( | iam_request_body | str | The Base64-encoded body of the signed request. | | iam_request_headers | str | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iam_request_url | str | The Base64-encoded HTTP URL used in the signed request. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | str | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | str | Target namespace. (requires Enterprise). | | nonce | str | The nonce to be used for subsequent login requests. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -189,7 +189,7 @@ If you experience problems setting this value it might not be settable. Please t Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- @@ -796,7 +796,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1389,7 +1389,7 @@ awsAuthBackendLogin.AwsAuthBackendLoginConfig( | iam_request_body | str | The Base64-encoded body of the signed request. | | iam_request_headers | str | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iam_request_url | str | The Base64-encoded HTTP URL used in the signed request. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | str | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | str | Target namespace. (requires Enterprise). | | nonce | str | The nonce to be used for subsequent login requests. | @@ -1479,7 +1479,7 @@ backend: str AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1493,7 +1493,7 @@ iam_http_request_method: str The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1507,7 +1507,7 @@ iam_request_body: str The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1521,7 +1521,7 @@ iam_request_headers: str The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1535,7 +1535,7 @@ iam_request_url: str The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1547,7 +1547,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1564,7 +1564,7 @@ identity: str Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1578,7 +1578,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1592,7 +1592,7 @@ nonce: str The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1606,7 +1606,7 @@ pkcs7: str PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1620,7 +1620,7 @@ role: str AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1634,7 +1634,7 @@ signature: str Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendLogin.typescript.md b/docs/awsAuthBackendLogin.typescript.md index 34f36428..93cdf39a 100644 --- a/docs/awsAuthBackendLogin.typescript.md +++ b/docs/awsAuthBackendLogin.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendLogin -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login vault_aws_auth_backend_login}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AwsAuthBackendLogin to imp The id of the existing AwsAuthBackendLogin that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#import import section} in the documentation of this resource for the id to use --- @@ -1124,7 +1124,7 @@ const awsAuthBackendLoginConfig: awsAuthBackendLogin.AwsAuthBackendLoginConfig = | iamRequestBody | string | The Base64-encoded body of the signed request. | | iamRequestHeaders | string | The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. | | iamRequestUrl | string | The Base64-encoded HTTP URL used in the signed request. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. | | identity | string | Base64-encoded EC2 instance identity document to authenticate with. | | namespace | string | Target namespace. (requires Enterprise). | | nonce | string | The nonce to be used for subsequent login requests. | @@ -1214,7 +1214,7 @@ public readonly backend: string; AWS Auth Backend to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#backend AwsAuthBackendLogin#backend} --- @@ -1228,7 +1228,7 @@ public readonly iamHttpRequestMethod: string; The HTTP method used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_http_request_method AwsAuthBackendLogin#iam_http_request_method} --- @@ -1242,7 +1242,7 @@ public readonly iamRequestBody: string; The Base64-encoded body of the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_body AwsAuthBackendLogin#iam_request_body} --- @@ -1256,7 +1256,7 @@ public readonly iamRequestHeaders: string; The Base64-encoded, JSON serialized representation of the sts:GetCallerIdentity HTTP request headers. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_headers AwsAuthBackendLogin#iam_request_headers} --- @@ -1270,7 +1270,7 @@ public readonly iamRequestUrl: string; The Base64-encoded HTTP URL used in the signed request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#iam_request_url AwsAuthBackendLogin#iam_request_url} --- @@ -1282,7 +1282,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#id AwsAuthBackendLogin#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1299,7 +1299,7 @@ public readonly identity: string; Base64-encoded EC2 instance identity document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#identity AwsAuthBackendLogin#identity} --- @@ -1313,7 +1313,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#namespace AwsAuthBackendLogin#namespace} --- @@ -1327,7 +1327,7 @@ public readonly nonce: string; The nonce to be used for subsequent login requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#nonce AwsAuthBackendLogin#nonce} --- @@ -1341,7 +1341,7 @@ public readonly pkcs7: string; PKCS7 signature of the identity document to authenticate with, with all newline characters removed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#pkcs7 AwsAuthBackendLogin#pkcs7} --- @@ -1355,7 +1355,7 @@ public readonly role: string; AWS Auth Role to read the token from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#role AwsAuthBackendLogin#role} --- @@ -1369,7 +1369,7 @@ public readonly signature: string; Base64-encoded SHA256 RSA signature of the instance identtiy document to authenticate with. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_login#signature AwsAuthBackendLogin#signature} --- diff --git a/docs/awsAuthBackendRole.csharp.md b/docs/awsAuthBackendRole.csharp.md index 1e8a6bb2..b1033a35 100644 --- a/docs/awsAuthBackendRole.csharp.md +++ b/docs/awsAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1579,7 +1579,7 @@ new AwsAuthBackendRoleConfig { | BoundSubnetIds | string[] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | BoundVpcIds | string[] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | DisallowReauthentication | object | When true, only allows a single token to be granted per instance ID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | InferredAwsRegion | string | The region to search for the inferred entities in. | | InferredEntityType | string | The type of inferencing Vault should do. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1677,7 +1677,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1691,7 +1691,7 @@ public object AllowInstanceMigration { get; set; } When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1705,7 +1705,7 @@ public string AuthType { get; set; } The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1719,7 +1719,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1733,7 +1733,7 @@ public string[] BoundAccountIds { get; set; } Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1747,7 +1747,7 @@ public string[] BoundAmiIds { get; set; } Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1761,7 +1761,7 @@ public string[] BoundEc2InstanceIds { get; set; } Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1775,7 +1775,7 @@ public string[] BoundIamInstanceProfileArns { get; set; } Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1789,7 +1789,7 @@ public string[] BoundIamPrincipalArns { get; set; } The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1803,7 +1803,7 @@ public string[] BoundIamRoleArns { get; set; } Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1817,7 +1817,7 @@ public string[] BoundRegions { get; set; } Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1831,7 +1831,7 @@ public string[] BoundSubnetIds { get; set; } Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1845,7 +1845,7 @@ public string[] BoundVpcIds { get; set; } Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1859,7 +1859,7 @@ public object DisallowReauthentication { get; set; } When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1871,7 +1871,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1888,7 +1888,7 @@ public string InferredAwsRegion { get; set; } The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1902,7 +1902,7 @@ public string InferredEntityType { get; set; } The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1916,7 +1916,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1946,7 +1946,7 @@ public string RoleTag { get; set; } The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1960,7 +1960,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1974,7 +1974,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1988,7 +1988,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2002,7 +2002,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2016,7 +2016,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2030,7 +2030,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2044,7 +2044,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2058,7 +2058,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2072,7 +2072,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.go.md b/docs/awsAuthBackendRole.go.md index 45c4f2c0..4505cbeb 100644 --- a/docs/awsAuthBackendRole.go.md +++ b/docs/awsAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1579,7 +1579,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendrole" | BoundSubnetIds | *[]*string | Only EC2 instances associated with this subnet ID will be permitted to log in. | | BoundVpcIds | *[]*string | Only EC2 instances associated with this VPC ID will be permitted to log in. | | DisallowReauthentication | interface{} | When true, only allows a single token to be granted per instance ID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | InferredAwsRegion | *string | The region to search for the inferred entities in. | | InferredEntityType | *string | The type of inferencing Vault should do. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1677,7 +1677,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1691,7 +1691,7 @@ AllowInstanceMigration interface{} When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1705,7 +1705,7 @@ AuthType *string The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1719,7 +1719,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1733,7 +1733,7 @@ BoundAccountIds *[]*string Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1747,7 +1747,7 @@ BoundAmiIds *[]*string Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1761,7 +1761,7 @@ BoundEc2InstanceIds *[]*string Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1775,7 +1775,7 @@ BoundIamInstanceProfileArns *[]*string Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1789,7 +1789,7 @@ BoundIamPrincipalArns *[]*string The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1803,7 +1803,7 @@ BoundIamRoleArns *[]*string Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1817,7 +1817,7 @@ BoundRegions *[]*string Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1831,7 +1831,7 @@ BoundSubnetIds *[]*string Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1845,7 +1845,7 @@ BoundVpcIds *[]*string Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1859,7 +1859,7 @@ DisallowReauthentication interface{} When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1871,7 +1871,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1888,7 +1888,7 @@ InferredAwsRegion *string The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1902,7 +1902,7 @@ InferredEntityType *string The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1916,7 +1916,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1932,7 +1932,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1946,7 +1946,7 @@ RoleTag *string The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1960,7 +1960,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1974,7 +1974,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1988,7 +1988,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2002,7 +2002,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2016,7 +2016,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2030,7 +2030,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2044,7 +2044,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2058,7 +2058,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2072,7 +2072,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.java.md b/docs/awsAuthBackendRole.java.md index 9c9a92c9..861f1cdd 100644 --- a/docs/awsAuthBackendRole.java.md +++ b/docs/awsAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -84,7 +84,7 @@ AwsAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | boundSubnetIds | java.util.List | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | java.util.List | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | java.lang.String | The region to search for the inferred entities in. | | inferredEntityType | java.lang.String | The type of inferencing Vault should do. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -168,7 +168,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -351,7 +351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -431,7 +431,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -441,7 +441,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -451,7 +451,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- @@ -1074,7 +1074,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1998,7 +1998,7 @@ AwsAuthBackendRoleConfig.builder() | boundSubnetIds | java.util.List | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | java.util.List | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | java.lang.String | The region to search for the inferred entities in. | | inferredEntityType | java.lang.String | The type of inferencing Vault should do. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -2096,7 +2096,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -2110,7 +2110,7 @@ public java.lang.Object getAllowInstanceMigration(); When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -2124,7 +2124,7 @@ public java.lang.String getAuthType(); The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -2138,7 +2138,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -2152,7 +2152,7 @@ public java.util.List getBoundAccountIds(); Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -2166,7 +2166,7 @@ public java.util.List getBoundAmiIds(); Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -2180,7 +2180,7 @@ public java.util.List getBoundEc2InstanceIds(); Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -2194,7 +2194,7 @@ public java.util.List getBoundIamInstanceProfileArns(); Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -2208,7 +2208,7 @@ public java.util.List getBoundIamPrincipalArns(); The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -2222,7 +2222,7 @@ public java.util.List getBoundIamRoleArns(); Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -2236,7 +2236,7 @@ public java.util.List getBoundRegions(); Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -2250,7 +2250,7 @@ public java.util.List getBoundSubnetIds(); Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -2264,7 +2264,7 @@ public java.util.List getBoundVpcIds(); Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -2278,7 +2278,7 @@ public java.lang.Object getDisallowReauthentication(); When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -2290,7 +2290,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2307,7 +2307,7 @@ public java.lang.String getInferredAwsRegion(); The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -2321,7 +2321,7 @@ public java.lang.String getInferredEntityType(); The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -2335,7 +2335,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -2351,7 +2351,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -2365,7 +2365,7 @@ public java.lang.String getRoleTag(); The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -2379,7 +2379,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -2393,7 +2393,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -2407,7 +2407,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2421,7 +2421,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2435,7 +2435,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2449,7 +2449,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2463,7 +2463,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2477,7 +2477,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2491,7 +2491,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.python.md b/docs/awsAuthBackendRole.python.md index fef8a3ec..c354746a 100644 --- a/docs/awsAuthBackendRole.python.md +++ b/docs/awsAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -78,7 +78,7 @@ awsAuthBackendRole.AwsAuthBackendRole( | bound_subnet_ids | typing.List[str] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | bound_vpc_ids | typing.List[str] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | When true, only allows a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferred_aws_region | str | The region to search for the inferred entities in. | | inferred_entity_type | str | The type of inferencing Vault should do. | | namespace | str | Target namespace. (requires Enterprise). | @@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -313,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -345,7 +345,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -415,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -425,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -435,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -445,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- @@ -1114,7 +1114,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2030,7 +2030,7 @@ awsAuthBackendRole.AwsAuthBackendRoleConfig( | bound_subnet_ids | typing.List[str] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | bound_vpc_ids | typing.List[str] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | When true, only allows a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferred_aws_region | str | The region to search for the inferred entities in. | | inferred_entity_type | str | The type of inferencing Vault should do. | | namespace | str | Target namespace. (requires Enterprise). | @@ -2128,7 +2128,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -2142,7 +2142,7 @@ allow_instance_migration: typing.Union[bool, IResolvable] When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -2156,7 +2156,7 @@ auth_type: str The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -2170,7 +2170,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -2184,7 +2184,7 @@ bound_account_ids: typing.List[str] Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -2198,7 +2198,7 @@ bound_ami_ids: typing.List[str] Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -2212,7 +2212,7 @@ bound_ec2_instance_ids: typing.List[str] Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -2226,7 +2226,7 @@ bound_iam_instance_profile_arns: typing.List[str] Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -2240,7 +2240,7 @@ bound_iam_principal_arns: typing.List[str] The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -2254,7 +2254,7 @@ bound_iam_role_arns: typing.List[str] Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -2268,7 +2268,7 @@ bound_regions: typing.List[str] Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -2282,7 +2282,7 @@ bound_subnet_ids: typing.List[str] Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -2296,7 +2296,7 @@ bound_vpc_ids: typing.List[str] Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -2310,7 +2310,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable] When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -2322,7 +2322,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2339,7 +2339,7 @@ inferred_aws_region: str The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -2353,7 +2353,7 @@ inferred_entity_type: str The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -2367,7 +2367,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -2383,7 +2383,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -2397,7 +2397,7 @@ role_tag: str The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -2411,7 +2411,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -2425,7 +2425,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -2439,7 +2439,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -2453,7 +2453,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -2467,7 +2467,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -2481,7 +2481,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2495,7 +2495,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2509,7 +2509,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2523,7 +2523,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRole.typescript.md b/docs/awsAuthBackendRole.typescript.md index 3d5e0195..a3f034ea 100644 --- a/docs/awsAuthBackendRole.typescript.md +++ b/docs/awsAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role vault_aws_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the AwsAuthBackendRole to impo The id of the existing AwsAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1542,7 +1542,7 @@ const awsAuthBackendRoleConfig: awsAuthBackendRole.AwsAuthBackendRoleConfig = { | boundSubnetIds | string[] | Only EC2 instances associated with this subnet ID will be permitted to log in. | | boundVpcIds | string[] | Only EC2 instances associated with this VPC ID will be permitted to log in. | | disallowReauthentication | boolean \| cdktf.IResolvable | When true, only allows a single token to be granted per instance ID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. | | inferredAwsRegion | string | The region to search for the inferred entities in. | | inferredEntityType | string | The type of inferencing Vault should do. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1640,7 +1640,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role AwsAuthBackendRole#role} --- @@ -1654,7 +1654,7 @@ public readonly allowInstanceMigration: boolean | IResolvable; When true, allows migration of the underlying instance where the client resides. Use with caution. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#allow_instance_migration AwsAuthBackendRole#allow_instance_migration} --- @@ -1668,7 +1668,7 @@ public readonly authType: string; The auth type permitted for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#auth_type AwsAuthBackendRole#auth_type} --- @@ -1682,7 +1682,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#backend AwsAuthBackendRole#backend} --- @@ -1696,7 +1696,7 @@ public readonly boundAccountIds: string[]; Only EC2 instances with this account ID in their identity document will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_account_ids AwsAuthBackendRole#bound_account_ids} --- @@ -1710,7 +1710,7 @@ public readonly boundAmiIds: string[]; Only EC2 instances using this AMI ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ami_ids AwsAuthBackendRole#bound_ami_ids} --- @@ -1724,7 +1724,7 @@ public readonly boundEc2InstanceIds: string[]; Only EC2 instances that match this instance ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_ec2_instance_ids AwsAuthBackendRole#bound_ec2_instance_ids} --- @@ -1738,7 +1738,7 @@ public readonly boundIamInstanceProfileArns: string[]; Only EC2 instances associated with an IAM instance profile ARN that matches this value will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_instance_profile_arns AwsAuthBackendRole#bound_iam_instance_profile_arns} --- @@ -1752,7 +1752,7 @@ public readonly boundIamPrincipalArns: string[]; The IAM principal that must be authenticated using the iam auth method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_principal_arns AwsAuthBackendRole#bound_iam_principal_arns} --- @@ -1766,7 +1766,7 @@ public readonly boundIamRoleArns: string[]; Only EC2 instances that match this IAM role ARN will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_iam_role_arns AwsAuthBackendRole#bound_iam_role_arns} --- @@ -1780,7 +1780,7 @@ public readonly boundRegions: string[]; Only EC2 instances in this region will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_regions AwsAuthBackendRole#bound_regions} --- @@ -1794,7 +1794,7 @@ public readonly boundSubnetIds: string[]; Only EC2 instances associated with this subnet ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_subnet_ids AwsAuthBackendRole#bound_subnet_ids} --- @@ -1808,7 +1808,7 @@ public readonly boundVpcIds: string[]; Only EC2 instances associated with this VPC ID will be permitted to log in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#bound_vpc_ids AwsAuthBackendRole#bound_vpc_ids} --- @@ -1822,7 +1822,7 @@ public readonly disallowReauthentication: boolean | IResolvable; When true, only allows a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#disallow_reauthentication AwsAuthBackendRole#disallow_reauthentication} --- @@ -1834,7 +1834,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#id AwsAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1851,7 +1851,7 @@ public readonly inferredAwsRegion: string; The region to search for the inferred entities in. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_aws_region AwsAuthBackendRole#inferred_aws_region} --- @@ -1865,7 +1865,7 @@ public readonly inferredEntityType: string; The type of inferencing Vault should do. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#inferred_entity_type AwsAuthBackendRole#inferred_entity_type} --- @@ -1879,7 +1879,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#namespace AwsAuthBackendRole#namespace} --- @@ -1895,7 +1895,7 @@ Whether or not Vault should resolve the bound_iam_principal_arn to an AWS Unique When true, deleting a principal and recreating it with the same name won't automatically grant the new principal the same roles in Vault that the old principal had. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#resolve_aws_unique_ids AwsAuthBackendRole#resolve_aws_unique_ids} --- @@ -1909,7 +1909,7 @@ public readonly roleTag: string; The key of the tag on EC2 instance to use for role tags. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#role_tag AwsAuthBackendRole#role_tag} --- @@ -1923,7 +1923,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_bound_cidrs AwsAuthBackendRole#token_bound_cidrs} --- @@ -1937,7 +1937,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_explicit_max_ttl AwsAuthBackendRole#token_explicit_max_ttl} --- @@ -1951,7 +1951,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_max_ttl AwsAuthBackendRole#token_max_ttl} --- @@ -1965,7 +1965,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_no_default_policy AwsAuthBackendRole#token_no_default_policy} --- @@ -1979,7 +1979,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_num_uses AwsAuthBackendRole#token_num_uses} --- @@ -1993,7 +1993,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_period AwsAuthBackendRole#token_period} --- @@ -2007,7 +2007,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_policies AwsAuthBackendRole#token_policies} --- @@ -2021,7 +2021,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_ttl AwsAuthBackendRole#token_ttl} --- @@ -2035,7 +2035,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role#token_type AwsAuthBackendRole#token_type} --- diff --git a/docs/awsAuthBackendRoleTag.csharp.md b/docs/awsAuthBackendRoleTag.csharp.md index d85794fd..1012d8b8 100644 --- a/docs/awsAuthBackendRoleTag.csharp.md +++ b/docs/awsAuthBackendRoleTag.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new AwsAuthBackendRoleTagConfig { | AllowInstanceMigration | object | Allows migration of the underlying instance where the client resides. | | Backend | string | AWS auth backend to read tags from. | | DisallowReauthentication | object | Only allow a single token to be granted per instance ID. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | InstanceId | string | Instance ID for which this tag is intended. | | MaxTtl | string | The maximum allowed lifetime of tokens issued using this role. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1082,7 +1082,7 @@ public object AllowInstanceMigration { get; set; } Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1096,7 +1096,7 @@ public string Backend { get; set; } AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1110,7 +1110,7 @@ public object DisallowReauthentication { get; set; } Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1155,7 +1155,7 @@ public string MaxTtl { get; set; } The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1169,7 +1169,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1183,7 +1183,7 @@ public string[] Policies { get; set; } Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.go.md b/docs/awsAuthBackendRoleTag.go.md index 34c26482..e197ecb1 100644 --- a/docs/awsAuthBackendRoleTag.go.md +++ b/docs/awsAuthBackendRoleTag.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag | AllowInstanceMigration | interface{} | Allows migration of the underlying instance where the client resides. | | Backend | *string | AWS auth backend to read tags from. | | DisallowReauthentication | interface{} | Only allow a single token to be granted per instance ID. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | InstanceId | *string | Instance ID for which this tag is intended. | | MaxTtl | *string | The maximum allowed lifetime of tokens issued using this role. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1082,7 +1082,7 @@ AllowInstanceMigration interface{} Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1096,7 +1096,7 @@ Backend *string AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1110,7 +1110,7 @@ DisallowReauthentication interface{} Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1155,7 +1155,7 @@ MaxTtl *string The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1169,7 +1169,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1183,7 +1183,7 @@ Policies *[]*string Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.java.md b/docs/awsAuthBackendRoleTag.java.md index 8f16dd92..5fee6279 100644 --- a/docs/awsAuthBackendRoleTag.java.md +++ b/docs/awsAuthBackendRoleTag.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -52,7 +52,7 @@ AwsAuthBackendRoleTag.Builder.create(Construct scope, java.lang.String id) | allowInstanceMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | java.lang.String | AWS auth backend to read tags from. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | java.lang.String | Instance ID for which this tag is intended. | | maxTtl | java.lang.String | The maximum allowed lifetime of tokens issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- @@ -692,7 +692,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ AwsAuthBackendRoleTagConfig.builder() | allowInstanceMigration | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | java.lang.String | AWS auth backend to read tags from. | | disallowReauthentication | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | java.lang.String | Instance ID for which this tag is intended. | | maxTtl | java.lang.String | The maximum allowed lifetime of tokens issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1243,7 +1243,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1257,7 +1257,7 @@ public java.lang.Object getAllowInstanceMigration(); Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1271,7 +1271,7 @@ public java.lang.String getBackend(); AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1285,7 +1285,7 @@ public java.lang.Object getDisallowReauthentication(); Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1297,7 +1297,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1316,7 +1316,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1330,7 +1330,7 @@ public java.lang.String getMaxTtl(); The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1344,7 +1344,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1358,7 +1358,7 @@ public java.util.List getPolicies(); Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.python.md b/docs/awsAuthBackendRoleTag.python.md index 77b34f02..a58761ae 100644 --- a/docs/awsAuthBackendRoleTag.python.md +++ b/docs/awsAuthBackendRoleTag.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -48,7 +48,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTag( | allow_instance_migration | typing.Union[bool, cdktf.IResolvable] | Allows migration of the underlying instance where the client resides. | | backend | str | AWS auth backend to read tags from. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | Only allow a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instance_id | str | Instance ID for which this tag is intended. | | max_ttl | str | The maximum allowed lifetime of tokens issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- @@ -734,7 +734,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -1191,7 +1191,7 @@ awsAuthBackendRoleTag.AwsAuthBackendRoleTagConfig( | allow_instance_migration | typing.Union[bool, cdktf.IResolvable] | Allows migration of the underlying instance where the client resides. | | backend | str | AWS auth backend to read tags from. | | disallow_reauthentication | typing.Union[bool, cdktf.IResolvable] | Only allow a single token to be granted per instance ID. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instance_id | str | Instance ID for which this tag is intended. | | max_ttl | str | The maximum allowed lifetime of tokens issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1279,7 +1279,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1293,7 +1293,7 @@ allow_instance_migration: typing.Union[bool, IResolvable] Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1307,7 +1307,7 @@ backend: str AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1321,7 +1321,7 @@ disallow_reauthentication: typing.Union[bool, IResolvable] Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1333,7 +1333,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1352,7 +1352,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1366,7 +1366,7 @@ max_ttl: str The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1380,7 +1380,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1394,7 +1394,7 @@ policies: typing.List[str] Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoleTag.typescript.md b/docs/awsAuthBackendRoleTag.typescript.md index 6f64f17f..aa6af2e5 100644 --- a/docs/awsAuthBackendRoleTag.typescript.md +++ b/docs/awsAuthBackendRoleTag.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoleTag -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag vault_aws_auth_backend_role_tag}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AwsAuthBackendRoleTag to i The id of the existing AwsAuthBackendRoleTag that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#import import section} in the documentation of this resource for the id to use --- @@ -963,7 +963,7 @@ const awsAuthBackendRoleTagConfig: awsAuthBackendRoleTag.AwsAuthBackendRoleTagCo | allowInstanceMigration | boolean \| cdktf.IResolvable | Allows migration of the underlying instance where the client resides. | | backend | string | AWS auth backend to read tags from. | | disallowReauthentication | boolean \| cdktf.IResolvable | Only allow a single token to be granted per instance ID. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. | | instanceId | string | Instance ID for which this tag is intended. | | maxTtl | string | The maximum allowed lifetime of tokens issued using this role. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1051,7 +1051,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#role AwsAuthBackendRoleTag#role} --- @@ -1065,7 +1065,7 @@ public readonly allowInstanceMigration: boolean | IResolvable; Allows migration of the underlying instance where the client resides. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#allow_instance_migration AwsAuthBackendRoleTag#allow_instance_migration} --- @@ -1079,7 +1079,7 @@ public readonly backend: string; AWS auth backend to read tags from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#backend AwsAuthBackendRoleTag#backend} --- @@ -1093,7 +1093,7 @@ public readonly disallowReauthentication: boolean | IResolvable; Only allow a single token to be granted per instance ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#disallow_reauthentication AwsAuthBackendRoleTag#disallow_reauthentication} --- @@ -1105,7 +1105,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#id AwsAuthBackendRoleTag#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ Instance ID for which this tag is intended. The created tag can only be used by the instance with the given ID. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#instance_id AwsAuthBackendRoleTag#instance_id} --- @@ -1138,7 +1138,7 @@ public readonly maxTtl: string; The maximum allowed lifetime of tokens issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#max_ttl AwsAuthBackendRoleTag#max_ttl} --- @@ -1152,7 +1152,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#namespace AwsAuthBackendRoleTag#namespace} --- @@ -1166,7 +1166,7 @@ public readonly policies: string[]; Policies to be associated with the tag. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_role_tag#policies AwsAuthBackendRoleTag#policies} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.csharp.md b/docs/awsAuthBackendRoletagBlacklist.csharp.md index e585555e..5f7e4b71 100644 --- a/docs/awsAuthBackendRoletagBlacklist.csharp.md +++ b/docs/awsAuthBackendRoletagBlacklist.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new AwsAuthBackendRoletagBlacklistConfig { | Provisioners | object[] | *No description.* | | Backend | string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | object | If true, disables the periodic tidying of the roletag blacklist entries. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SafetyBuffer | double | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -922,7 +922,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -936,7 +936,7 @@ public object DisablePeriodicTidy { get; set; } If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -979,7 +979,7 @@ public double SafetyBuffer { get; set; } The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.go.md b/docs/awsAuthBackendRoletagBlacklist.go.md index b5924ff9..a7277e7f 100644 --- a/docs/awsAuthBackendRoletagBlacklist.go.md +++ b/docs/awsAuthBackendRoletagBlacklist.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendroletag | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Unique name of the auth backend to configure. | | DisablePeriodicTidy | interface{} | If true, disables the periodic tidying of the roletag blacklist entries. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SafetyBuffer | *f64 | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -922,7 +922,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -936,7 +936,7 @@ DisablePeriodicTidy interface{} If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -979,7 +979,7 @@ SafetyBuffer *f64 The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.java.md b/docs/awsAuthBackendRoletagBlacklist.java.md index b21450d7..8b2e0bfb 100644 --- a/docs/awsAuthBackendRoletagBlacklist.java.md +++ b/docs/awsAuthBackendRoletagBlacklist.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendRoletagBlacklist.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -148,7 +148,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- @@ -613,7 +613,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -959,7 +959,7 @@ AwsAuthBackendRoletagBlacklistConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Unique name of the auth backend to configure. | | disablePeriodicTidy | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | safetyBuffer | java.lang.Number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1045,7 +1045,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -1059,7 +1059,7 @@ public java.lang.Object getDisablePeriodicTidy(); If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -1071,7 +1071,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1088,7 +1088,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -1102,7 +1102,7 @@ public java.lang.Number getSafetyBuffer(); The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.python.md b/docs/awsAuthBackendRoletagBlacklist.python.md index adb0ead6..20e6a574 100644 --- a/docs/awsAuthBackendRoletagBlacklist.python.md +++ b/docs/awsAuthBackendRoletagBlacklist.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -42,7 +42,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklist( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ awsAuthBackendRoletagBlacklist.AwsAuthBackendRoletagBlacklistConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Unique name of the auth backend to configure. | | disable_periodic_tidy | typing.Union[bool, cdktf.IResolvable] | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | str | Target namespace. (requires Enterprise). | | safety_buffer | typing.Union[int, float] | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -1083,7 +1083,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -1097,7 +1097,7 @@ disable_periodic_tidy: typing.Union[bool, IResolvable] If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -1140,7 +1140,7 @@ safety_buffer: typing.Union[int, float] The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendRoletagBlacklist.typescript.md b/docs/awsAuthBackendRoletagBlacklist.typescript.md index b5cdf33d..c5395d0c 100644 --- a/docs/awsAuthBackendRoletagBlacklist.typescript.md +++ b/docs/awsAuthBackendRoletagBlacklist.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendRoletagBlacklist -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist vault_aws_auth_backend_roletag_blacklist}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the AwsAuthBackendRoletagBlack The id of the existing AwsAuthBackendRoletagBlacklist that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const awsAuthBackendRoletagBlacklistConfig: awsAuthBackendRoletagBlacklist.AwsAu | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Unique name of the auth backend to configure. | | disablePeriodicTidy | boolean \| cdktf.IResolvable | If true, disables the periodic tidying of the roletag blacklist entries. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. | | namespace | string | Target namespace. (requires Enterprise). | | safetyBuffer | number | The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. | @@ -909,7 +909,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#backend AwsAuthBackendRoletagBlacklist#backend} --- @@ -923,7 +923,7 @@ public readonly disablePeriodicTidy: boolean | IResolvable; If true, disables the periodic tidying of the roletag blacklist entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#disable_periodic_tidy AwsAuthBackendRoletagBlacklist#disable_periodic_tidy} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#id AwsAuthBackendRoletagBlacklist#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#namespace AwsAuthBackendRoletagBlacklist#namespace} --- @@ -966,7 +966,7 @@ public readonly safetyBuffer: number; The amount of extra time that must have passed beyond the roletag expiration, before it's removed from backend storage. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_roletag_blacklist#safety_buffer AwsAuthBackendRoletagBlacklist#safety_buffer} --- diff --git a/docs/awsAuthBackendStsRole.csharp.md b/docs/awsAuthBackendStsRole.csharp.md index d166c008..0efa48e8 100644 --- a/docs/awsAuthBackendStsRole.csharp.md +++ b/docs/awsAuthBackendStsRole.csharp.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ new AwsAuthBackendStsRoleConfig { | AccountId | string | AWS account ID to be associated with STS role. | | StsRole | string | AWS ARN for STS role to be assumed when interacting with the account specified. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ public string AccountId { get; set; } AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -929,7 +929,7 @@ public string StsRole { get; set; } AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -943,7 +943,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.go.md b/docs/awsAuthBackendStsRole.go.md index d57818fc..d80099be 100644 --- a/docs/awsAuthBackendStsRole.go.md +++ b/docs/awsAuthBackendStsRole.go.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awsauthbackendstsrole | AccountId | *string | AWS account ID to be associated with STS role. | | StsRole | *string | AWS ARN for STS role to be assumed when interacting with the account specified. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ AccountId *string AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -929,7 +929,7 @@ StsRole *string AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -943,7 +943,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.java.md b/docs/awsAuthBackendStsRole.java.md index cf6195b1..555dc145 100644 --- a/docs/awsAuthBackendStsRole.java.md +++ b/docs/awsAuthBackendStsRole.java.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -45,7 +45,7 @@ AwsAuthBackendStsRole.Builder.create(Construct scope, java.lang.String id) | accountId | java.lang.String | AWS account ID to be associated with STS role. | | stsRole | java.lang.String | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -951,7 +951,7 @@ AwsAuthBackendStsRoleConfig.builder() | accountId | java.lang.String | AWS account ID to be associated with STS role. | | stsRole | java.lang.String | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1036,7 +1036,7 @@ public java.lang.String getAccountId(); AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -1050,7 +1050,7 @@ public java.lang.String getStsRole(); AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -1064,7 +1064,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -1076,7 +1076,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1093,7 +1093,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.python.md b/docs/awsAuthBackendStsRole.python.md index 1d940a61..bdbad4c8 100644 --- a/docs/awsAuthBackendStsRole.python.md +++ b/docs/awsAuthBackendStsRole.python.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -43,7 +43,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRole( | account_id | str | AWS account ID to be associated with STS role. | | sts_role | str | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -991,7 +991,7 @@ awsAuthBackendStsRole.AwsAuthBackendStsRoleConfig( | account_id | str | AWS account ID to be associated with STS role. | | sts_role | str | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1076,7 +1076,7 @@ account_id: str AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -1090,7 +1090,7 @@ sts_role: str AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -1104,7 +1104,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsAuthBackendStsRole.typescript.md b/docs/awsAuthBackendStsRole.typescript.md index d86dc053..4b0f422e 100644 --- a/docs/awsAuthBackendStsRole.typescript.md +++ b/docs/awsAuthBackendStsRole.typescript.md @@ -4,7 +4,7 @@ ### AwsAuthBackendStsRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role vault_aws_auth_backend_sts_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsAuthBackendStsRole to i The id of the existing AwsAuthBackendStsRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#import import section} in the documentation of this resource for the id to use --- @@ -817,7 +817,7 @@ const awsAuthBackendStsRoleConfig: awsAuthBackendStsRole.AwsAuthBackendStsRoleCo | accountId | string | AWS account ID to be associated with STS role. | | stsRole | string | AWS ARN for STS role to be assumed when interacting with the account specified. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -902,7 +902,7 @@ public readonly accountId: string; AWS account ID to be associated with STS role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#account_id AwsAuthBackendStsRole#account_id} --- @@ -916,7 +916,7 @@ public readonly stsRole: string; AWS ARN for STS role to be assumed when interacting with the account specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#sts_role AwsAuthBackendStsRole#sts_role} --- @@ -930,7 +930,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#backend AwsAuthBackendStsRole#backend} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#id AwsAuthBackendStsRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_auth_backend_sts_role#namespace AwsAuthBackendStsRole#namespace} --- diff --git a/docs/awsSecretBackend.csharp.md b/docs/awsSecretBackend.csharp.md index 2053bc91..223b9f18 100644 --- a/docs/awsSecretBackend.csharp.md +++ b/docs/awsSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1236,7 +1236,7 @@ new AwsSecretBackendConfig { | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | IamEndpoint | string | Specifies a custom HTTP IAM endpoint to use. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | IdentityTokenAudience | string | The audience claim value. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | IdentityTokenTtl | double | The TTL of generated identity tokens in seconds. | @@ -1332,7 +1332,7 @@ public string AccessKey { get; set; } The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1346,7 +1346,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1374,7 +1374,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1388,7 +1388,7 @@ public string IamEndpoint { get; set; } Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1400,7 +1400,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1417,7 +1417,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1431,7 +1431,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1445,7 +1445,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1459,7 +1459,7 @@ public object Local { get; set; } Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1473,7 +1473,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1487,7 +1487,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1501,7 +1501,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1515,7 +1515,7 @@ public string Region { get; set; } The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1529,7 +1529,7 @@ public string RoleArn { get; set; } Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1543,7 +1543,7 @@ public string SecretKey { get; set; } The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1557,7 +1557,7 @@ public string StsEndpoint { get; set; } Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1571,7 +1571,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.go.md b/docs/awsSecretBackend.go.md index 2218c77c..db2fc9dc 100644 --- a/docs/awsSecretBackend.go.md +++ b/docs/awsSecretBackend.go.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1236,7 +1236,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackend" | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | IamEndpoint | *string | Specifies a custom HTTP IAM endpoint to use. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | IdentityTokenAudience | *string | The audience claim value. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | IdentityTokenTtl | *f64 | The TTL of generated identity tokens in seconds. | @@ -1332,7 +1332,7 @@ AccessKey *string The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1346,7 +1346,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1360,7 +1360,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1374,7 +1374,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1388,7 +1388,7 @@ IamEndpoint *string Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1400,7 +1400,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1417,7 +1417,7 @@ IdentityTokenAudience *string The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1431,7 +1431,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1445,7 +1445,7 @@ IdentityTokenTtl *f64 The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1459,7 +1459,7 @@ Local interface{} Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1473,7 +1473,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1487,7 +1487,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1501,7 +1501,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1515,7 +1515,7 @@ Region *string The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1529,7 +1529,7 @@ RoleArn *string Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1543,7 +1543,7 @@ SecretKey *string The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1557,7 +1557,7 @@ StsEndpoint *string Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1571,7 +1571,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.java.md b/docs/awsSecretBackend.java.md index 90d5e102..1c8960fb 100644 --- a/docs/awsSecretBackend.java.md +++ b/docs/awsSecretBackend.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -62,7 +62,7 @@ AwsSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | java.lang.String | Specifies a custom HTTP IAM endpoint to use. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- @@ -868,7 +868,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1517,7 +1517,7 @@ AwsSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | java.lang.String | Specifies a custom HTTP IAM endpoint to use. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -1613,7 +1613,7 @@ public java.lang.String getAccessKey(); The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1627,7 +1627,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1641,7 +1641,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1655,7 +1655,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1669,7 +1669,7 @@ public java.lang.String getIamEndpoint(); Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1681,7 +1681,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1698,7 +1698,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1712,7 +1712,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1726,7 +1726,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1740,7 +1740,7 @@ public java.lang.Object getLocal(); Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1754,7 +1754,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1768,7 +1768,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1782,7 +1782,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1796,7 +1796,7 @@ public java.lang.String getRegion(); The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1810,7 +1810,7 @@ public java.lang.String getRoleArn(); Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1824,7 +1824,7 @@ public java.lang.String getSecretKey(); The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1838,7 +1838,7 @@ public java.lang.String getStsEndpoint(); Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1852,7 +1852,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.python.md b/docs/awsSecretBackend.python.md index b83bab42..613602c8 100644 --- a/docs/awsSecretBackend.python.md +++ b/docs/awsSecretBackend.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ awsSecretBackend.AwsSecretBackend( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | iam_endpoint | str | Specifies a custom HTTP IAM endpoint to use. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- @@ -910,7 +910,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1553,7 +1553,7 @@ awsSecretBackend.AwsSecretBackendConfig( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | iam_endpoint | str | Specifies a custom HTTP IAM endpoint to use. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -1649,7 +1649,7 @@ access_key: str The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1663,7 +1663,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1677,7 +1677,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1691,7 +1691,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1705,7 +1705,7 @@ iam_endpoint: str Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1717,7 +1717,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1734,7 +1734,7 @@ identity_token_audience: str The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1748,7 +1748,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1762,7 +1762,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1776,7 +1776,7 @@ local: typing.Union[bool, IResolvable] Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1790,7 +1790,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1804,7 +1804,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1818,7 +1818,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1832,7 +1832,7 @@ region: str The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1846,7 +1846,7 @@ role_arn: str Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1860,7 +1860,7 @@ secret_key: str The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1874,7 +1874,7 @@ sts_endpoint: str Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1888,7 +1888,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackend.typescript.md b/docs/awsSecretBackend.typescript.md index 1f3a1458..5650c2f0 100644 --- a/docs/awsSecretBackend.typescript.md +++ b/docs/awsSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend vault_aws_secret_backend}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AwsSecretBackend to import The id of the existing AwsSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1210,7 +1210,7 @@ const awsSecretBackendConfig: awsSecretBackend.AwsSecretBackendConfig = { ... } | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | iamEndpoint | string | Specifies a custom HTTP IAM endpoint to use. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. | | identityTokenAudience | string | The audience claim value. | | identityTokenKey | string | The key to use for signing identity tokens. | | identityTokenTtl | number | The TTL of generated identity tokens in seconds. | @@ -1306,7 +1306,7 @@ public readonly accessKey: string; The AWS Access Key ID to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#access_key AwsSecretBackend#access_key} --- @@ -1320,7 +1320,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#default_lease_ttl_seconds AwsSecretBackend#default_lease_ttl_seconds} --- @@ -1334,7 +1334,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#description AwsSecretBackend#description} --- @@ -1348,7 +1348,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#disable_remount AwsSecretBackend#disable_remount} --- @@ -1362,7 +1362,7 @@ public readonly iamEndpoint: string; Specifies a custom HTTP IAM endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#iam_endpoint AwsSecretBackend#iam_endpoint} --- @@ -1374,7 +1374,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#id AwsSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1391,7 +1391,7 @@ public readonly identityTokenAudience: string; The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_audience AwsSecretBackend#identity_token_audience} --- @@ -1405,7 +1405,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_key AwsSecretBackend#identity_token_key} --- @@ -1419,7 +1419,7 @@ public readonly identityTokenTtl: number; The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#identity_token_ttl AwsSecretBackend#identity_token_ttl} --- @@ -1433,7 +1433,7 @@ public readonly local: boolean | IResolvable; Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#local AwsSecretBackend#local} --- @@ -1447,7 +1447,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#max_lease_ttl_seconds AwsSecretBackend#max_lease_ttl_seconds} --- @@ -1461,7 +1461,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#namespace AwsSecretBackend#namespace} --- @@ -1475,7 +1475,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#path AwsSecretBackend#path} --- @@ -1489,7 +1489,7 @@ public readonly region: string; The AWS region to make API calls against. Defaults to us-east-1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#region AwsSecretBackend#region} --- @@ -1503,7 +1503,7 @@ public readonly roleArn: string; Role ARN to assume for plugin identity token federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#role_arn AwsSecretBackend#role_arn} --- @@ -1517,7 +1517,7 @@ public readonly secretKey: string; The AWS Secret Access Key to use when generating new credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#secret_key AwsSecretBackend#secret_key} --- @@ -1531,7 +1531,7 @@ public readonly stsEndpoint: string; Specifies a custom HTTP STS endpoint to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#sts_endpoint AwsSecretBackend#sts_endpoint} --- @@ -1545,7 +1545,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend#username_template AwsSecretBackend#username_template} --- diff --git a/docs/awsSecretBackendRole.csharp.md b/docs/awsSecretBackendRole.csharp.md index 6abe090c..5b2d16be 100644 --- a/docs/awsSecretBackendRole.csharp.md +++ b/docs/awsSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1157,7 +1157,7 @@ new AwsSecretBackendRoleConfig { | ExternalId | string | External ID to set for assume role creds. | | IamGroups | string[] | A list of IAM group names. | | IamTags | System.Collections.Generic.IDictionary | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | MaxStsTtl | double | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | Namespace | string | Target namespace. (requires Enterprise). | | PermissionsBoundaryArn | string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1249,7 +1249,7 @@ public string Backend { get; set; } The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1263,7 +1263,7 @@ public string CredentialType { get; set; } Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1277,7 +1277,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1293,7 +1293,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1307,7 +1307,7 @@ public string ExternalId { get; set; } External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -1323,7 +1323,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1337,7 +1337,7 @@ public System.Collections.Generic.IDictionary IamTags { get; set A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -1349,7 +1349,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1382,7 +1382,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1398,7 +1398,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1412,7 +1412,7 @@ public string[] PolicyArns { get; set; } ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1426,7 +1426,7 @@ public string PolicyDocument { get; set; } IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1440,7 +1440,7 @@ public string[] RoleArns { get; set; } ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1454,7 +1454,7 @@ public System.Collections.Generic.IDictionary SessionTags { get; Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -1468,7 +1468,7 @@ public string UserPath { get; set; } The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.go.md b/docs/awsSecretBackendRole.go.md index 77d8988f..67963fb1 100644 --- a/docs/awsSecretBackendRole.go.md +++ b/docs/awsSecretBackendRole.go.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1157,7 +1157,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendrole" | ExternalId | *string | External ID to set for assume role creds. | | IamGroups | *[]*string | A list of IAM group names. | | IamTags | *map[string]*string | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | MaxStsTtl | *f64 | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | Namespace | *string | Target namespace. (requires Enterprise). | | PermissionsBoundaryArn | *string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1249,7 +1249,7 @@ Backend *string The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1263,7 +1263,7 @@ CredentialType *string Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1277,7 +1277,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1293,7 +1293,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1307,7 +1307,7 @@ ExternalId *string External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -1323,7 +1323,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1337,7 +1337,7 @@ IamTags *map[string]*string A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -1349,7 +1349,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1382,7 +1382,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1398,7 +1398,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1412,7 +1412,7 @@ PolicyArns *[]*string ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1426,7 +1426,7 @@ PolicyDocument *string IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1440,7 +1440,7 @@ RoleArns *[]*string ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1454,7 +1454,7 @@ SessionTags *map[string]*string Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -1468,7 +1468,7 @@ UserPath *string The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.java.md b/docs/awsSecretBackendRole.java.md index 92e29fb3..bf40e2d8 100644 --- a/docs/awsSecretBackendRole.java.md +++ b/docs/awsSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -60,7 +60,7 @@ AwsSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | externalId | java.lang.String | External ID to set for assume role creds. | | iamGroups | java.util.List | A list of IAM group names. | | iamTags | java.util.Map | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | java.lang.Number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | java.lang.String | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -138,7 +138,7 @@ Must be unique amongst siblings in the same scope The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -170,7 +170,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -192,7 +192,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -225,7 +225,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -247,7 +247,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- @@ -815,7 +815,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1418,7 +1418,7 @@ AwsSecretBackendRoleConfig.builder() | externalId | java.lang.String | External ID to set for assume role creds. | | iamGroups | java.util.List | A list of IAM group names. | | iamTags | java.util.Map | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | java.lang.Number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | java.lang.String | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1510,7 +1510,7 @@ public java.lang.String getBackend(); The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1524,7 +1524,7 @@ public java.lang.String getCredentialType(); Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1538,7 +1538,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1554,7 +1554,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1568,7 +1568,7 @@ public java.lang.String getExternalId(); External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -1584,7 +1584,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1598,7 +1598,7 @@ public java.util.Map getIamTags(); A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -1610,7 +1610,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1629,7 +1629,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1643,7 +1643,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1659,7 +1659,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1673,7 +1673,7 @@ public java.util.List getPolicyArns(); ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1687,7 +1687,7 @@ public java.lang.String getPolicyDocument(); IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1701,7 +1701,7 @@ public java.util.List getRoleArns(); ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1715,7 +1715,7 @@ public java.util.Map getSessionTags(); Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -1729,7 +1729,7 @@ public java.lang.String getUserPath(); The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.python.md b/docs/awsSecretBackendRole.python.md index 282417c7..e4416976 100644 --- a/docs/awsSecretBackendRole.python.md +++ b/docs/awsSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -58,7 +58,7 @@ awsSecretBackendRole.AwsSecretBackendRole( | external_id | str | External ID to set for assume role creds. | | iam_groups | typing.List[str] | A list of IAM group names. | | iam_tags | typing.Mapping[str] | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | max_sts_ttl | typing.Union[int, float] | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | str | Target namespace. (requires Enterprise). | | permissions_boundary_arn | str | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -168,7 +168,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -190,7 +190,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -223,7 +223,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -245,7 +245,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- @@ -859,7 +859,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1458,7 +1458,7 @@ awsSecretBackendRole.AwsSecretBackendRoleConfig( | external_id | str | External ID to set for assume role creds. | | iam_groups | typing.List[str] | A list of IAM group names. | | iam_tags | typing.Mapping[str] | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | max_sts_ttl | typing.Union[int, float] | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | str | Target namespace. (requires Enterprise). | | permissions_boundary_arn | str | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1550,7 +1550,7 @@ backend: str The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1564,7 +1564,7 @@ credential_type: str Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1578,7 +1578,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1594,7 +1594,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1608,7 +1608,7 @@ external_id: str External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -1624,7 +1624,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1638,7 +1638,7 @@ iam_tags: typing.Mapping[str] A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -1650,7 +1650,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1669,7 +1669,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1683,7 +1683,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1699,7 +1699,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1713,7 +1713,7 @@ policy_arns: typing.List[str] ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1727,7 +1727,7 @@ policy_document: str IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1741,7 +1741,7 @@ role_arns: typing.List[str] ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1755,7 +1755,7 @@ session_tags: typing.Mapping[str] Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -1769,7 +1769,7 @@ user_path: str The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendRole.typescript.md b/docs/awsSecretBackendRole.typescript.md index 7b46217b..fc635db2 100644 --- a/docs/awsSecretBackendRole.typescript.md +++ b/docs/awsSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role vault_aws_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the AwsSecretBackendRole to im The id of the existing AwsSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1133,7 +1133,7 @@ const awsSecretBackendRoleConfig: awsSecretBackendRole.AwsSecretBackendRoleConfi | externalId | string | External ID to set for assume role creds. | | iamGroups | string[] | A list of IAM group names. | | iamTags | {[ key: string ]: string} | A map of strings representing key/value pairs used as tags for any IAM user created by this role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. | | maxStsTtl | number | The max allowed TTL in seconds for STS credentials (credentials TTL are capped to max_sts_ttl). | | namespace | string | Target namespace. (requires Enterprise). | | permissionsBoundaryArn | string | The ARN of the AWS Permissions Boundary to attach to IAM users created in the role. | @@ -1225,7 +1225,7 @@ public readonly backend: string; The path of the AWS Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#backend AwsSecretBackendRole#backend} --- @@ -1239,7 +1239,7 @@ public readonly credentialType: string; Role credential type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#credential_type AwsSecretBackendRole#credential_type} --- @@ -1253,7 +1253,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#name AwsSecretBackendRole#name} --- @@ -1269,7 +1269,7 @@ The default TTL in seconds for STS credentials. When a TTL is not specified when STS credentials are requested, and a default TTL is specified on the role, then this default TTL will be used. Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#default_sts_ttl AwsSecretBackendRole#default_sts_ttl} --- @@ -1283,7 +1283,7 @@ public readonly externalId: string; External ID to set for assume role creds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#external_id AwsSecretBackendRole#external_id} --- @@ -1299,7 +1299,7 @@ A list of IAM group names. IAM users generated against this vault role will be added to these IAM Groups. For a credential type of assumed_role or federation_token, the policies sent to the corresponding AWS call (sts:AssumeRole or sts:GetFederation) will be the policies from each group in iam_groups combined with the policy_document and policy_arns parameters. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_groups AwsSecretBackendRole#iam_groups} --- @@ -1313,7 +1313,7 @@ public readonly iamTags: {[ key: string ]: string}; A map of strings representing key/value pairs used as tags for any IAM user created by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#iam_tags AwsSecretBackendRole#iam_tags} --- @@ -1325,7 +1325,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#id AwsSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1344,7 +1344,7 @@ The max allowed TTL in seconds for STS credentials (credentials TTL are capped t Valid only when credential_type is one of assumed_role or federation_token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#max_sts_ttl AwsSecretBackendRole#max_sts_ttl} --- @@ -1358,7 +1358,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#namespace AwsSecretBackendRole#namespace} --- @@ -1374,7 +1374,7 @@ The ARN of the AWS Permissions Boundary to attach to IAM users created in the ro Valid only when credential_type is iam_user. If not specified, then no permissions boundary policy will be attached. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#permissions_boundary_arn AwsSecretBackendRole#permissions_boundary_arn} --- @@ -1388,7 +1388,7 @@ public readonly policyArns: string[]; ARN for an existing IAM policy the role should use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_arns AwsSecretBackendRole#policy_arns} --- @@ -1402,7 +1402,7 @@ public readonly policyDocument: string; IAM policy the role should use in JSON format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#policy_document AwsSecretBackendRole#policy_document} --- @@ -1416,7 +1416,7 @@ public readonly roleArns: string[]; ARNs of AWS roles allowed to be assumed. Only valid when credential_type is 'assumed_role'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#role_arns AwsSecretBackendRole#role_arns} --- @@ -1430,7 +1430,7 @@ public readonly sessionTags: {[ key: string ]: string}; Session tags to be set for assume role creds created. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#session_tags AwsSecretBackendRole#session_tags} --- @@ -1444,7 +1444,7 @@ public readonly userPath: string; The path for the user name. Valid only when credential_type is iam_user. Default is /. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_role#user_path AwsSecretBackendRole#user_path} --- diff --git a/docs/awsSecretBackendStaticRole.csharp.md b/docs/awsSecretBackendStaticRole.csharp.md index ae4d0ecb..3226765d 100644 --- a/docs/awsSecretBackendStaticRole.csharp.md +++ b/docs/awsSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ new AwsSecretBackendStaticRoleConfig { | RotationPeriod | double | How often Vault should rotate the password of the user entry. | | Username | string | The username of the existing AWS IAM user to manage password rotation for. | | Backend | string | The path where the AWS secrets backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -953,7 +953,7 @@ public double RotationPeriod { get; set; } How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -967,7 +967,7 @@ public string Username { get; set; } The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -981,7 +981,7 @@ public string Backend { get; set; } The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.go.md b/docs/awsSecretBackendStaticRole.go.md index 8aa04d76..6ea451ca 100644 --- a/docs/awsSecretBackendStaticRole.go.md +++ b/docs/awsSecretBackendStaticRole.go.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/awssecretbackendstati | RotationPeriod | *f64 | How often Vault should rotate the password of the user entry. | | Username | *string | The username of the existing AWS IAM user to manage password rotation for. | | Backend | *string | The path where the AWS secrets backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -953,7 +953,7 @@ RotationPeriod *f64 How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -967,7 +967,7 @@ Username *string The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -981,7 +981,7 @@ Backend *string The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.java.md b/docs/awsSecretBackendStaticRole.java.md index ce0d3396..72770cef 100644 --- a/docs/awsSecretBackendStaticRole.java.md +++ b/docs/awsSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -47,7 +47,7 @@ AwsSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id) | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing AWS IAM user to manage password rotation for. | | backend | java.lang.String | The path where the AWS secrets backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -987,7 +987,7 @@ AwsSecretBackendStaticRoleConfig.builder() | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing AWS IAM user to manage password rotation for. | | backend | java.lang.String | The path where the AWS secrets backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1072,7 +1072,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -1086,7 +1086,7 @@ public java.lang.Number getRotationPeriod(); How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -1100,7 +1100,7 @@ public java.lang.String getUsername(); The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -1114,7 +1114,7 @@ public java.lang.String getBackend(); The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -1126,7 +1126,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.python.md b/docs/awsSecretBackendStaticRole.python.md index 0c55e82d..4d2418ad 100644 --- a/docs/awsSecretBackendStaticRole.python.md +++ b/docs/awsSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -45,7 +45,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRole( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing AWS IAM user to manage password rotation for. | | backend | str | The path where the AWS secrets backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ awsSecretBackendStaticRole.AwsSecretBackendStaticRoleConfig( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing AWS IAM user to manage password rotation for. | | backend | str | The path where the AWS secrets backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1112,7 +1112,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -1126,7 +1126,7 @@ rotation_period: typing.Union[int, float] How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -1140,7 +1140,7 @@ username: str The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -1154,7 +1154,7 @@ backend: str The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/awsSecretBackendStaticRole.typescript.md b/docs/awsSecretBackendStaticRole.typescript.md index e882f678..f1559181 100644 --- a/docs/awsSecretBackendStaticRole.typescript.md +++ b/docs/awsSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### AwsSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role vault_aws_secret_backend_static_role}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the AwsSecretBackendStaticRole The id of the existing AwsSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const awsSecretBackendStaticRoleConfig: awsSecretBackendStaticRole.AwsSecretBack | rotationPeriod | number | How often Vault should rotate the password of the user entry. | | username | string | The username of the existing AWS IAM user to manage password rotation for. | | backend | string | The path where the AWS secrets backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -925,7 +925,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#name AwsSecretBackendStaticRole#name} --- @@ -939,7 +939,7 @@ public readonly rotationPeriod: number; How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#rotation_period AwsSecretBackendStaticRole#rotation_period} --- @@ -953,7 +953,7 @@ public readonly username: string; The username of the existing AWS IAM user to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#username AwsSecretBackendStaticRole#username} --- @@ -967,7 +967,7 @@ public readonly backend: string; The path where the AWS secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#backend AwsSecretBackendStaticRole#backend} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#id AwsSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/aws_secret_backend_static_role#namespace AwsSecretBackendStaticRole#namespace} --- diff --git a/docs/azureAuthBackendConfig.csharp.md b/docs/azureAuthBackendConfig.csharp.md index 872e37e3..765f0180 100644 --- a/docs/azureAuthBackendConfig.csharp.md +++ b/docs/azureAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -983,7 +983,7 @@ new AzureAuthBackendConfigConfig { | ClientId | string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | ClientSecret | string | The client secret for credentials to query the Azure APIs. | | Environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | IdentityTokenAudience | string | The audience claim value. | | IdentityTokenTtl | double | The TTL of generated identity tokens in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1070,7 +1070,7 @@ public string Resource { get; set; } The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1084,7 +1084,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1098,7 +1098,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1112,7 +1112,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1126,7 +1126,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1140,7 +1140,7 @@ public string Environment { get; set; } The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1152,7 +1152,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1169,7 +1169,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -1183,7 +1183,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -1197,7 +1197,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.go.md b/docs/azureAuthBackendConfig.go.md index b319021f..5a9a80fe 100644 --- a/docs/azureAuthBackendConfig.go.md +++ b/docs/azureAuthBackendConfig.go.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -983,7 +983,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendconfi | ClientId | *string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | ClientSecret | *string | The client secret for credentials to query the Azure APIs. | | Environment | *string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | IdentityTokenAudience | *string | The audience claim value. | | IdentityTokenTtl | *f64 | The TTL of generated identity tokens in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1070,7 +1070,7 @@ Resource *string The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1084,7 +1084,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1098,7 +1098,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1112,7 +1112,7 @@ ClientId *string The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1126,7 +1126,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1140,7 +1140,7 @@ Environment *string The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1152,7 +1152,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1169,7 +1169,7 @@ IdentityTokenAudience *string The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -1183,7 +1183,7 @@ IdentityTokenTtl *f64 The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -1197,7 +1197,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.java.md b/docs/azureAuthBackendConfig.java.md index b61c20b8..2a0065bd 100644 --- a/docs/azureAuthBackendConfig.java.md +++ b/docs/azureAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -53,7 +53,7 @@ AzureAuthBackendConfig.Builder.create(Construct scope, java.lang.String id) | clientId | java.lang.String | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | java.lang.String | The client secret for credentials to query the Azure APIs. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -197,7 +197,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- @@ -700,7 +700,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1164,7 +1164,7 @@ AzureAuthBackendConfigConfig.builder() | clientId | java.lang.String | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | java.lang.String | The client secret for credentials to query the Azure APIs. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1251,7 +1251,7 @@ public java.lang.String getResource(); The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1265,7 +1265,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1279,7 +1279,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1293,7 +1293,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1307,7 +1307,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1321,7 +1321,7 @@ public java.lang.String getEnvironment(); The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1333,7 +1333,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1350,7 +1350,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -1364,7 +1364,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -1378,7 +1378,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.python.md b/docs/azureAuthBackendConfig.python.md index 2993a997..697f80b1 100644 --- a/docs/azureAuthBackendConfig.python.md +++ b/docs/azureAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -51,7 +51,7 @@ azureAuthBackendConfig.AzureAuthBackendConfig( | client_id | str | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | client_secret | str | The client secret for credentials to query the Azure APIs. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -195,7 +195,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- @@ -744,7 +744,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -1204,7 +1204,7 @@ azureAuthBackendConfig.AzureAuthBackendConfigConfig( | client_id | str | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | client_secret | str | The client secret for credentials to query the Azure APIs. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1291,7 +1291,7 @@ resource: str The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1305,7 +1305,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1319,7 +1319,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1333,7 +1333,7 @@ client_id: str The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1347,7 +1347,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1361,7 +1361,7 @@ environment: str The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1373,7 +1373,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1390,7 +1390,7 @@ identity_token_audience: str The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -1404,7 +1404,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -1418,7 +1418,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendConfig.typescript.md b/docs/azureAuthBackendConfig.typescript.md index 8582dcfb..30dd159e 100644 --- a/docs/azureAuthBackendConfig.typescript.md +++ b/docs/azureAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### AzureAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config vault_azure_auth_backend_config}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the AzureAuthBackendConfig to The id of the existing AzureAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -965,7 +965,7 @@ const azureAuthBackendConfigConfig: azureAuthBackendConfig.AzureAuthBackendConfi | clientId | string | The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. | | clientSecret | string | The client secret for credentials to query the Azure APIs. | | environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. | | identityTokenAudience | string | The audience claim value. | | identityTokenTtl | number | The TTL of generated identity tokens in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1052,7 +1052,7 @@ public readonly resource: string; The configured URL for the application registered in Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#resource AzureAuthBackendConfig#resource} --- @@ -1066,7 +1066,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#tenant_id AzureAuthBackendConfig#tenant_id} --- @@ -1080,7 +1080,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#backend AzureAuthBackendConfig#backend} --- @@ -1094,7 +1094,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_id AzureAuthBackendConfig#client_id} --- @@ -1108,7 +1108,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#client_secret AzureAuthBackendConfig#client_secret} --- @@ -1122,7 +1122,7 @@ public readonly environment: string; The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#environment AzureAuthBackendConfig#environment} --- @@ -1134,7 +1134,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#id AzureAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1151,7 +1151,7 @@ public readonly identityTokenAudience: string; The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_audience AzureAuthBackendConfig#identity_token_audience} --- @@ -1165,7 +1165,7 @@ public readonly identityTokenTtl: number; The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#identity_token_ttl AzureAuthBackendConfig#identity_token_ttl} --- @@ -1179,7 +1179,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_config#namespace AzureAuthBackendConfig#namespace} --- diff --git a/docs/azureAuthBackendRole.csharp.md b/docs/azureAuthBackendRole.csharp.md index 1c5aac4c..d7ba9e6c 100644 --- a/docs/azureAuthBackendRole.csharp.md +++ b/docs/azureAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1262,7 +1262,7 @@ new AzureAuthBackendRoleConfig { | BoundScaleSets | string[] | The list of scale set names that the login is restricted to. | | BoundServicePrincipalIds | string[] | The list of Service Principal IDs that login is restricted to. | | BoundSubscriptionIds | string[] | The list of subscription IDs that login is restricted to. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1356,7 +1356,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1370,7 +1370,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1384,7 +1384,7 @@ public string[] BoundGroupIds { get; set; } The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1398,7 +1398,7 @@ public string[] BoundLocations { get; set; } The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1412,7 +1412,7 @@ public string[] BoundResourceGroups { get; set; } The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1426,7 +1426,7 @@ public string[] BoundScaleSets { get; set; } The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1440,7 +1440,7 @@ public string[] BoundServicePrincipalIds { get; set; } The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1454,7 +1454,7 @@ public string[] BoundSubscriptionIds { get; set; } The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1466,7 +1466,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1483,7 +1483,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1497,7 +1497,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1511,7 +1511,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1525,7 +1525,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1539,7 +1539,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1553,7 +1553,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1567,7 +1567,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1581,7 +1581,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1595,7 +1595,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1609,7 +1609,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.go.md b/docs/azureAuthBackendRole.go.md index 171eb183..59e4221d 100644 --- a/docs/azureAuthBackendRole.go.md +++ b/docs/azureAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1262,7 +1262,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azureauthbackendrole" | BoundScaleSets | *[]*string | The list of scale set names that the login is restricted to. | | BoundServicePrincipalIds | *[]*string | The list of Service Principal IDs that login is restricted to. | | BoundSubscriptionIds | *[]*string | The list of subscription IDs that login is restricted to. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1356,7 +1356,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1370,7 +1370,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1384,7 +1384,7 @@ BoundGroupIds *[]*string The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1398,7 +1398,7 @@ BoundLocations *[]*string The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1412,7 +1412,7 @@ BoundResourceGroups *[]*string The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1426,7 +1426,7 @@ BoundScaleSets *[]*string The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1440,7 +1440,7 @@ BoundServicePrincipalIds *[]*string The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1454,7 +1454,7 @@ BoundSubscriptionIds *[]*string The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1466,7 +1466,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1483,7 +1483,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1497,7 +1497,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1511,7 +1511,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1525,7 +1525,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1539,7 +1539,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1553,7 +1553,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1567,7 +1567,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1581,7 +1581,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1595,7 +1595,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1609,7 +1609,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.java.md b/docs/azureAuthBackendRole.java.md index 4c2aaaa0..638975bb 100644 --- a/docs/azureAuthBackendRole.java.md +++ b/docs/azureAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -65,7 +65,7 @@ AzureAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | boundScaleSets | java.util.List | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | java.util.List | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | java.util.List | The list of subscription IDs that login is restricted to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -236,7 +236,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -326,7 +326,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- @@ -879,7 +879,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1553,7 +1553,7 @@ AzureAuthBackendRoleConfig.builder() | boundScaleSets | java.util.List | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | java.util.List | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | java.util.List | The list of subscription IDs that login is restricted to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1647,7 +1647,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1661,7 +1661,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1675,7 +1675,7 @@ public java.util.List getBoundGroupIds(); The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1689,7 +1689,7 @@ public java.util.List getBoundLocations(); The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1703,7 +1703,7 @@ public java.util.List getBoundResourceGroups(); The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1717,7 +1717,7 @@ public java.util.List getBoundScaleSets(); The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1731,7 +1731,7 @@ public java.util.List getBoundServicePrincipalIds(); The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1745,7 +1745,7 @@ public java.util.List getBoundSubscriptionIds(); The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1757,7 +1757,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1774,7 +1774,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1788,7 +1788,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1802,7 +1802,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1816,7 +1816,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1830,7 +1830,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1844,7 +1844,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1858,7 +1858,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1872,7 +1872,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1886,7 +1886,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1900,7 +1900,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.python.md b/docs/azureAuthBackendRole.python.md index f7ea66e6..d1e861ae 100644 --- a/docs/azureAuthBackendRole.python.md +++ b/docs/azureAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -62,7 +62,7 @@ azureAuthBackendRole.AzureAuthBackendRole( | bound_scale_sets | typing.List[str] | The list of scale set names that the login is restricted to. | | bound_service_principal_ids | typing.List[str] | The list of Service Principal IDs that login is restricted to. | | bound_subscription_ids | typing.List[str] | The list of subscription IDs that login is restricted to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -142,7 +142,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -233,7 +233,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- @@ -922,7 +922,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1591,7 +1591,7 @@ azureAuthBackendRole.AzureAuthBackendRoleConfig( | bound_scale_sets | typing.List[str] | The list of scale set names that the login is restricted to. | | bound_service_principal_ids | typing.List[str] | The list of Service Principal IDs that login is restricted to. | | bound_subscription_ids | typing.List[str] | The list of subscription IDs that login is restricted to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1685,7 +1685,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1699,7 +1699,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1713,7 +1713,7 @@ bound_group_ids: typing.List[str] The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1727,7 +1727,7 @@ bound_locations: typing.List[str] The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1741,7 +1741,7 @@ bound_resource_groups: typing.List[str] The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1755,7 +1755,7 @@ bound_scale_sets: typing.List[str] The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1769,7 +1769,7 @@ bound_service_principal_ids: typing.List[str] The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1783,7 +1783,7 @@ bound_subscription_ids: typing.List[str] The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1795,7 +1795,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1812,7 +1812,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1826,7 +1826,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1840,7 +1840,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1854,7 +1854,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1868,7 +1868,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1882,7 +1882,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1896,7 +1896,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1910,7 +1910,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1924,7 +1924,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1938,7 +1938,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureAuthBackendRole.typescript.md b/docs/azureAuthBackendRole.typescript.md index 583e97fe..0596293b 100644 --- a/docs/azureAuthBackendRole.typescript.md +++ b/docs/azureAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AzureAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role vault_azure_auth_backend_role}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the AzureAuthBackendRole to im The id of the existing AzureAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1235,7 +1235,7 @@ const azureAuthBackendRoleConfig: azureAuthBackendRole.AzureAuthBackendRoleConfi | boundScaleSets | string[] | The list of scale set names that the login is restricted to. | | boundServicePrincipalIds | string[] | The list of Service Principal IDs that login is restricted to. | | boundSubscriptionIds | string[] | The list of subscription IDs that login is restricted to. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1329,7 +1329,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#role AzureAuthBackendRole#role} --- @@ -1343,7 +1343,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#backend AzureAuthBackendRole#backend} --- @@ -1357,7 +1357,7 @@ public readonly boundGroupIds: string[]; The list of group ids that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_group_ids AzureAuthBackendRole#bound_group_ids} --- @@ -1371,7 +1371,7 @@ public readonly boundLocations: string[]; The list of locations that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_locations AzureAuthBackendRole#bound_locations} --- @@ -1385,7 +1385,7 @@ public readonly boundResourceGroups: string[]; The list of resource groups that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_resource_groups AzureAuthBackendRole#bound_resource_groups} --- @@ -1399,7 +1399,7 @@ public readonly boundScaleSets: string[]; The list of scale set names that the login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_scale_sets AzureAuthBackendRole#bound_scale_sets} --- @@ -1413,7 +1413,7 @@ public readonly boundServicePrincipalIds: string[]; The list of Service Principal IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_service_principal_ids AzureAuthBackendRole#bound_service_principal_ids} --- @@ -1427,7 +1427,7 @@ public readonly boundSubscriptionIds: string[]; The list of subscription IDs that login is restricted to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#bound_subscription_ids AzureAuthBackendRole#bound_subscription_ids} --- @@ -1439,7 +1439,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#id AzureAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1456,7 +1456,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#namespace AzureAuthBackendRole#namespace} --- @@ -1470,7 +1470,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_bound_cidrs AzureAuthBackendRole#token_bound_cidrs} --- @@ -1484,7 +1484,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_explicit_max_ttl AzureAuthBackendRole#token_explicit_max_ttl} --- @@ -1498,7 +1498,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_max_ttl AzureAuthBackendRole#token_max_ttl} --- @@ -1512,7 +1512,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_no_default_policy AzureAuthBackendRole#token_no_default_policy} --- @@ -1526,7 +1526,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_num_uses AzureAuthBackendRole#token_num_uses} --- @@ -1540,7 +1540,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_period AzureAuthBackendRole#token_period} --- @@ -1554,7 +1554,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_policies AzureAuthBackendRole#token_policies} --- @@ -1568,7 +1568,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_ttl AzureAuthBackendRole#token_ttl} --- @@ -1582,7 +1582,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_auth_backend_role#token_type AzureAuthBackendRole#token_type} --- diff --git a/docs/azureSecretBackend.csharp.md b/docs/azureSecretBackend.csharp.md index 8a8cae75..2bf1d541 100644 --- a/docs/azureSecretBackend.csharp.md +++ b/docs/azureSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1104,7 +1104,7 @@ new AzureSecretBackendConfig { | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | Environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | IdentityTokenAudience | string | The audience claim value. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | IdentityTokenTtl | double | The TTL of generated identity tokens in seconds. | @@ -1194,7 +1194,7 @@ public string SubscriptionId { get; set; } The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1208,7 +1208,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1222,7 +1222,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1236,7 +1236,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1250,7 +1250,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1264,7 +1264,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1278,7 +1278,7 @@ public string Environment { get; set; } The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1290,7 +1290,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1307,7 +1307,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -1321,7 +1321,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -1335,7 +1335,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -1349,7 +1349,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1363,7 +1363,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1377,7 +1377,7 @@ public object UseMicrosoftGraphApi { get; set; } Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.go.md b/docs/azureSecretBackend.go.md index bafd023f..18f35948 100644 --- a/docs/azureSecretBackend.go.md +++ b/docs/azureSecretBackend.go.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1104,7 +1104,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackend" | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | Environment | *string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | IdentityTokenAudience | *string | The audience claim value. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | IdentityTokenTtl | *f64 | The TTL of generated identity tokens in seconds. | @@ -1194,7 +1194,7 @@ SubscriptionId *string The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1208,7 +1208,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1222,7 +1222,7 @@ ClientId *string The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1236,7 +1236,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1250,7 +1250,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1264,7 +1264,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1278,7 +1278,7 @@ Environment *string The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1290,7 +1290,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1307,7 +1307,7 @@ IdentityTokenAudience *string The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -1321,7 +1321,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -1335,7 +1335,7 @@ IdentityTokenTtl *f64 The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -1349,7 +1349,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1363,7 +1363,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1377,7 +1377,7 @@ UseMicrosoftGraphApi interface{} Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.java.md b/docs/azureSecretBackend.java.md index c44e4114..6749047d 100644 --- a/docs/azureSecretBackend.java.md +++ b/docs/azureSecretBackend.java.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -60,7 +60,7 @@ AzureSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -217,7 +217,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- @@ -778,7 +778,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1337,7 +1337,7 @@ AzureSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | java.lang.String | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated identity tokens in seconds. | @@ -1427,7 +1427,7 @@ public java.lang.String getSubscriptionId(); The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1441,7 +1441,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1455,7 +1455,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1469,7 +1469,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1483,7 +1483,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1497,7 +1497,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1511,7 +1511,7 @@ public java.lang.String getEnvironment(); The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1523,7 +1523,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1540,7 +1540,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -1554,7 +1554,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -1568,7 +1568,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -1582,7 +1582,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1596,7 +1596,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1610,7 +1610,7 @@ public java.lang.Object getUseMicrosoftGraphApi(); Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.python.md b/docs/azureSecretBackend.python.md index dce1fd49..d0700123 100644 --- a/docs/azureSecretBackend.python.md +++ b/docs/azureSecretBackend.python.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -56,7 +56,7 @@ azureSecretBackend.AzureSecretBackend( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- @@ -820,7 +820,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1373,7 +1373,7 @@ azureSecretBackend.AzureSecretBackendConfig( | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | environment | str | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | identity_token_audience | str | The audience claim value. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated identity tokens in seconds. | @@ -1463,7 +1463,7 @@ subscription_id: str The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1477,7 +1477,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1491,7 +1491,7 @@ client_id: str The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1505,7 +1505,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1519,7 +1519,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1533,7 +1533,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1547,7 +1547,7 @@ environment: str The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1559,7 +1559,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1576,7 +1576,7 @@ identity_token_audience: str The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -1590,7 +1590,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -1604,7 +1604,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -1618,7 +1618,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1632,7 +1632,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1646,7 +1646,7 @@ use_microsoft_graph_api: typing.Union[bool, IResolvable] Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackend.typescript.md b/docs/azureSecretBackend.typescript.md index 17865e08..011387bf 100644 --- a/docs/azureSecretBackend.typescript.md +++ b/docs/azureSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### AzureSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend vault_azure_secret_backend}. #### Initializers @@ -551,7 +551,7 @@ The construct id used in the generated config for the AzureSecretBackend to impo The id of the existing AzureSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1082,7 +1082,7 @@ const azureSecretBackendConfig: azureSecretBackend.AzureSecretBackendConfig = { | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | environment | string | The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. | | identityTokenAudience | string | The audience claim value. | | identityTokenKey | string | The key to use for signing identity tokens. | | identityTokenTtl | number | The TTL of generated identity tokens in seconds. | @@ -1172,7 +1172,7 @@ public readonly subscriptionId: string; The subscription id for the Azure Active Directory. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#subscription_id AzureSecretBackend#subscription_id} --- @@ -1186,7 +1186,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#tenant_id AzureSecretBackend#tenant_id} --- @@ -1200,7 +1200,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. Currently read permissions to query compute resources are required. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_id AzureSecretBackend#client_id} --- @@ -1214,7 +1214,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#client_secret AzureSecretBackend#client_secret} --- @@ -1228,7 +1228,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#description AzureSecretBackend#description} --- @@ -1242,7 +1242,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#disable_remount AzureSecretBackend#disable_remount} --- @@ -1256,7 +1256,7 @@ public readonly environment: string; The Azure cloud environment. Valid values: AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud, AzureGermanCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#environment AzureSecretBackend#environment} --- @@ -1268,7 +1268,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#id AzureSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1285,7 +1285,7 @@ public readonly identityTokenAudience: string; The audience claim value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_audience AzureSecretBackend#identity_token_audience} --- @@ -1299,7 +1299,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_key AzureSecretBackend#identity_token_key} --- @@ -1313,7 +1313,7 @@ public readonly identityTokenTtl: number; The TTL of generated identity tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#identity_token_ttl AzureSecretBackend#identity_token_ttl} --- @@ -1327,7 +1327,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#namespace AzureSecretBackend#namespace} --- @@ -1341,7 +1341,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#path AzureSecretBackend#path} --- @@ -1355,7 +1355,7 @@ public readonly useMicrosoftGraphApi: boolean | IResolvable; Use the Microsoft Graph API. Should be set to true on vault-1.10+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend#use_microsoft_graph_api AzureSecretBackend#use_microsoft_graph_api} --- diff --git a/docs/azureSecretBackendRole.csharp.md b/docs/azureSecretBackendRole.csharp.md index 363a77f5..cab9ae54 100644 --- a/docs/azureSecretBackendRole.csharp.md +++ b/docs/azureSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ new AzureSecretBackendRoleAzureGroups { | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1086,7 +1086,7 @@ public string GroupName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1108,9 +1108,9 @@ new AzureSecretBackendRoleAzureRoles { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| RoleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| RoleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| Scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| RoleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| RoleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1122,7 +1122,7 @@ public string Scope { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1134,7 +1134,7 @@ public string RoleId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1146,7 +1146,7 @@ public string RoleName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1198,7 +1198,7 @@ new AzureSecretBackendRoleConfig { | AzureRoles | object | azure_roles block. | | Backend | string | Unique name of the auth backend to configure. | | Description | string | Human-friendly description of the mount for the backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | MaxTtl | string | Human-friendly description of the mount for the backend. | | Namespace | string | Target namespace. (requires Enterprise). | | PermanentlyDelete | object | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1288,7 +1288,7 @@ public string Role { get; set; } Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1302,7 +1302,7 @@ public string ApplicationObjectId { get; set; } Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1316,7 +1316,7 @@ public object AzureGroups { get; set; } azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1330,7 +1330,7 @@ public object AzureRoles { get; set; } azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1344,7 +1344,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1358,7 +1358,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1370,7 +1370,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1387,7 +1387,7 @@ public string MaxTtl { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1401,7 +1401,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1415,7 +1415,7 @@ public object PermanentlyDelete { get; set; } Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1445,7 +1445,7 @@ public string[] Tags { get; set; } Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1459,7 +1459,7 @@ public string Ttl { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.go.md b/docs/azureSecretBackendRole.go.md index 60cc7b75..15dffe55 100644 --- a/docs/azureSecretBackendRole.go.md +++ b/docs/azureSecretBackendRole.go.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1074,7 +1074,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1086,7 +1086,7 @@ GroupName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1108,9 +1108,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol | **Name** | **Type** | **Description** | | --- | --- | --- | -| Scope | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| RoleId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| RoleName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| Scope | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| RoleId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| RoleName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1122,7 +1122,7 @@ Scope *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1134,7 +1134,7 @@ RoleId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1146,7 +1146,7 @@ RoleName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1198,7 +1198,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/azuresecretbackendrol | AzureRoles | interface{} | azure_roles block. | | Backend | *string | Unique name of the auth backend to configure. | | Description | *string | Human-friendly description of the mount for the backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | MaxTtl | *string | Human-friendly description of the mount for the backend. | | Namespace | *string | Target namespace. (requires Enterprise). | | PermanentlyDelete | interface{} | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1288,7 +1288,7 @@ Role *string Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1302,7 +1302,7 @@ ApplicationObjectId *string Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1316,7 +1316,7 @@ AzureGroups interface{} azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1330,7 +1330,7 @@ AzureRoles interface{} azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1344,7 +1344,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1358,7 +1358,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1370,7 +1370,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1387,7 +1387,7 @@ MaxTtl *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1401,7 +1401,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1415,7 +1415,7 @@ PermanentlyDelete interface{} Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1431,7 +1431,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1445,7 +1445,7 @@ Tags *[]*string Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1459,7 +1459,7 @@ Ttl *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.java.md b/docs/azureSecretBackendRole.java.md index 40a545a0..604d9d60 100644 --- a/docs/azureSecretBackendRole.java.md +++ b/docs/azureSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -59,7 +59,7 @@ AzureSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | azureRoles | com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles> | azure_roles block. | | backend | java.lang.String | Unique name of the auth backend to configure. | | description | java.lang.String | Human-friendly description of the mount for the backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | java.lang.String | Human-friendly description of the mount for the backend. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permanentlyDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -238,7 +238,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- @@ -795,7 +795,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1292,7 +1292,7 @@ AzureSecretBackendRoleAzureGroups.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1304,7 +1304,7 @@ public java.lang.String getGroupName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1326,9 +1326,9 @@ AzureSecretBackendRoleAzureRoles.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| roleId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| roleName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| roleId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| roleName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1340,7 +1340,7 @@ public java.lang.String getScope(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1352,7 +1352,7 @@ public java.lang.String getRoleId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1364,7 +1364,7 @@ public java.lang.String getRoleName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1423,7 +1423,7 @@ AzureSecretBackendRoleConfig.builder() | azureRoles | com.hashicorp.cdktf.IResolvable OR java.util.List<AzureSecretBackendRoleAzureRoles> | azure_roles block. | | backend | java.lang.String | Unique name of the auth backend to configure. | | description | java.lang.String | Human-friendly description of the mount for the backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | java.lang.String | Human-friendly description of the mount for the backend. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | permanentlyDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1513,7 +1513,7 @@ public java.lang.String getRole(); Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1527,7 +1527,7 @@ public java.lang.String getApplicationObjectId(); Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1541,7 +1541,7 @@ public java.lang.Object getAzureGroups(); azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1555,7 +1555,7 @@ public java.lang.Object getAzureRoles(); azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1569,7 +1569,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1583,7 +1583,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1595,7 +1595,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1612,7 +1612,7 @@ public java.lang.String getMaxTtl(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1626,7 +1626,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1640,7 +1640,7 @@ public java.lang.Object getPermanentlyDelete(); Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1656,7 +1656,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1670,7 +1670,7 @@ public java.util.List getTags(); Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1684,7 +1684,7 @@ public java.lang.String getTtl(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.python.md b/docs/azureSecretBackendRole.python.md index d9c52af1..db828d38 100644 --- a/docs/azureSecretBackendRole.python.md +++ b/docs/azureSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -54,7 +54,7 @@ azureSecretBackendRole.AzureSecretBackendRole( | azure_roles | typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]] | azure_roles block. | | backend | str | Unique name of the auth backend to configure. | | description | str | Human-friendly description of the mount for the backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | max_ttl | str | Human-friendly description of the mount for the backend. | | namespace | str | Target namespace. (requires Enterprise). | | permanently_delete | typing.Union[bool, cdktf.IResolvable] | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -233,7 +233,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- @@ -840,7 +840,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1337,7 +1337,7 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureGroups( | **Name** | **Type** | **Description** | | --- | --- | --- | -| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1349,7 +1349,7 @@ group_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1371,9 +1371,9 @@ azureSecretBackendRole.AzureSecretBackendRoleAzureRoles( | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| role_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| role_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| role_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| role_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1385,7 +1385,7 @@ scope: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1397,7 +1397,7 @@ role_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1409,7 +1409,7 @@ role_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1461,7 +1461,7 @@ azureSecretBackendRole.AzureSecretBackendRoleConfig( | azure_roles | typing.Union[cdktf.IResolvable, typing.List[AzureSecretBackendRoleAzureRoles]] | azure_roles block. | | backend | str | Unique name of the auth backend to configure. | | description | str | Human-friendly description of the mount for the backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | max_ttl | str | Human-friendly description of the mount for the backend. | | namespace | str | Target namespace. (requires Enterprise). | | permanently_delete | typing.Union[bool, cdktf.IResolvable] | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1551,7 +1551,7 @@ role: str Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1565,7 +1565,7 @@ application_object_id: str Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1579,7 +1579,7 @@ azure_groups: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureG azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1593,7 +1593,7 @@ azure_roles: typing.Union[IResolvable, typing.List[AzureSecretBackendRoleAzureRo azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1607,7 +1607,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1621,7 +1621,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1633,7 +1633,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1650,7 +1650,7 @@ max_ttl: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1664,7 +1664,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1678,7 +1678,7 @@ permanently_delete: typing.Union[bool, IResolvable] Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1694,7 +1694,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1708,7 +1708,7 @@ tags: typing.List[str] Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1722,7 +1722,7 @@ ttl: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/azureSecretBackendRole.typescript.md b/docs/azureSecretBackendRole.typescript.md index 2fb5c337..acca03a4 100644 --- a/docs/azureSecretBackendRole.typescript.md +++ b/docs/azureSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### AzureSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role vault_azure_secret_backend_role}. #### Initializers @@ -577,7 +577,7 @@ The construct id used in the generated config for the AzureSecretBackendRole to The id of the existing AzureSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1072,7 +1072,7 @@ const azureSecretBackendRoleAzureGroups: azureSecretBackendRole.AzureSecretBacke | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | +| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. | --- @@ -1084,7 +1084,7 @@ public readonly groupName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#group_name AzureSecretBackendRole#group_name}. --- @@ -1102,9 +1102,9 @@ const azureSecretBackendRoleAzureRoles: azureSecretBackendRole.AzureSecretBacken | **Name** | **Type** | **Description** | | --- | --- | --- | -| scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | -| roleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | -| roleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | +| scope | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. | +| roleId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. | +| roleName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. | --- @@ -1116,7 +1116,7 @@ public readonly scope: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#scope AzureSecretBackendRole#scope}. --- @@ -1128,7 +1128,7 @@ public readonly roleId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_id AzureSecretBackendRole#role_id}. --- @@ -1140,7 +1140,7 @@ public readonly roleName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role_name AzureSecretBackendRole#role_name}. --- @@ -1171,7 +1171,7 @@ const azureSecretBackendRoleConfig: azureSecretBackendRole.AzureSecretBackendRol | azureRoles | cdktf.IResolvable \| AzureSecretBackendRoleAzureRoles[] | azure_roles block. | | backend | string | Unique name of the auth backend to configure. | | description | string | Human-friendly description of the mount for the backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. | | maxTtl | string | Human-friendly description of the mount for the backend. | | namespace | string | Target namespace. (requires Enterprise). | | permanentlyDelete | boolean \| cdktf.IResolvable | Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. | @@ -1261,7 +1261,7 @@ public readonly role: string; Name of the role to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#role AzureSecretBackendRole#role} --- @@ -1275,7 +1275,7 @@ public readonly applicationObjectId: string; Application Object ID for an existing service principal that will be used instead of creating dynamic service principals. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#application_object_id AzureSecretBackendRole#application_object_id} --- @@ -1289,7 +1289,7 @@ public readonly azureGroups: IResolvable | AzureSecretBackendRoleAzureGroups[]; azure_groups block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_groups AzureSecretBackendRole#azure_groups} --- @@ -1303,7 +1303,7 @@ public readonly azureRoles: IResolvable | AzureSecretBackendRoleAzureRoles[]; azure_roles block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#azure_roles AzureSecretBackendRole#azure_roles} --- @@ -1317,7 +1317,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#backend AzureSecretBackendRole#backend} --- @@ -1331,7 +1331,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#description AzureSecretBackendRole#description} --- @@ -1343,7 +1343,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#id AzureSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1360,7 +1360,7 @@ public readonly maxTtl: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#max_ttl AzureSecretBackendRole#max_ttl} --- @@ -1374,7 +1374,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#namespace AzureSecretBackendRole#namespace} --- @@ -1388,7 +1388,7 @@ public readonly permanentlyDelete: boolean | IResolvable; Indicates whether the applications and service principals created by Vault will be permanently deleted when the corresponding leases expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#permanently_delete AzureSecretBackendRole#permanently_delete} --- @@ -1404,7 +1404,7 @@ Specifies the security principal types that are allowed to sign in to the applic Valid values are: AzureADMyOrg, AzureADMultipleOrgs, AzureADandPersonalMicrosoftAccount, PersonalMicrosoftAccount -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#sign_in_audience AzureSecretBackendRole#sign_in_audience} --- @@ -1418,7 +1418,7 @@ public readonly tags: string[]; Comma-separated strings of Azure tags to attach to an application. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#tags AzureSecretBackendRole#tags} --- @@ -1432,7 +1432,7 @@ public readonly ttl: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/azure_secret_backend_role#ttl AzureSecretBackendRole#ttl} --- diff --git a/docs/certAuthBackendRole.csharp.md b/docs/certAuthBackendRole.csharp.md index c75fbddc..4b141722 100644 --- a/docs/certAuthBackendRole.csharp.md +++ b/docs/certAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1487,24 +1487,24 @@ new CertAuthBackendRoleConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| Name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| AllowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| AllowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| AllowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| AllowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| AllowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| AllowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| DisplayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| Name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| AllowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| AllowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| AllowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| AllowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| AllowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| AllowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| DisplayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OcspCaCertificates | string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | OcspEnabled | object | If enabled, validate certificates' revocation status using OCSP. | | OcspFailOpen | object | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | OcspQueryAllServers | object | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | OcspServersOverride | string[] | A comma-separated list of OCSP server addresses. | -| RequiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| RequiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | double | The maximum lifetime of the generated token. | @@ -1595,7 +1595,7 @@ public string Certificate { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1607,7 +1607,7 @@ public string Name { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1619,7 +1619,7 @@ public string[] AllowedCommonNames { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1631,7 +1631,7 @@ public string[] AllowedDnsSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1643,7 +1643,7 @@ public string[] AllowedEmailSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1655,7 +1655,7 @@ public string[] AllowedNames { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1667,7 +1667,7 @@ public string[] AllowedOrganizationalUnits { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1679,7 +1679,7 @@ public string[] AllowedUriSans { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1691,7 +1691,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1703,7 +1703,7 @@ public string DisplayName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1715,7 +1715,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1732,7 +1732,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1746,7 +1746,7 @@ public string OcspCaCertificates { get; set; } Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1760,7 +1760,7 @@ public object OcspEnabled { get; set; } If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1774,7 +1774,7 @@ public object OcspFailOpen { get; set; } If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1788,7 +1788,7 @@ public object OcspQueryAllServers { get; set; } If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1804,7 +1804,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1816,7 +1816,7 @@ public string[] RequiredExtensions { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1830,7 +1830,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1844,7 +1844,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1858,7 +1858,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1872,7 +1872,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1886,7 +1886,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1900,7 +1900,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1914,7 +1914,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1928,7 +1928,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1942,7 +1942,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.go.md b/docs/certAuthBackendRole.go.md index e96dc05f..41a635b7 100644 --- a/docs/certAuthBackendRole.go.md +++ b/docs/certAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1487,24 +1487,24 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/certauthbackendrole" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| Name | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| AllowedCommonNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| AllowedDnsSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| AllowedEmailSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| AllowedNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| AllowedOrganizationalUnits | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| AllowedUriSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| DisplayName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| Name | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| AllowedCommonNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| AllowedDnsSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| AllowedEmailSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| AllowedNames | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| AllowedOrganizationalUnits | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| AllowedUriSans | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| DisplayName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OcspCaCertificates | *string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | OcspEnabled | interface{} | If enabled, validate certificates' revocation status using OCSP. | | OcspFailOpen | interface{} | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | OcspQueryAllServers | interface{} | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | OcspServersOverride | *[]*string | A comma-separated list of OCSP server addresses. | -| RequiredExtensions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| RequiredExtensions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | *f64 | The maximum lifetime of the generated token. | @@ -1595,7 +1595,7 @@ Certificate *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1607,7 +1607,7 @@ Name *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1619,7 +1619,7 @@ AllowedCommonNames *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1631,7 +1631,7 @@ AllowedDnsSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1643,7 +1643,7 @@ AllowedEmailSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1655,7 +1655,7 @@ AllowedNames *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1667,7 +1667,7 @@ AllowedOrganizationalUnits *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1679,7 +1679,7 @@ AllowedUriSans *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1691,7 +1691,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1703,7 +1703,7 @@ DisplayName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1715,7 +1715,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1732,7 +1732,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1746,7 +1746,7 @@ OcspCaCertificates *string Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1760,7 +1760,7 @@ OcspEnabled interface{} If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1774,7 +1774,7 @@ OcspFailOpen interface{} If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1788,7 +1788,7 @@ OcspQueryAllServers interface{} If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1804,7 +1804,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1816,7 +1816,7 @@ RequiredExtensions *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1830,7 +1830,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1844,7 +1844,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1858,7 +1858,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1872,7 +1872,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1886,7 +1886,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1900,7 +1900,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1914,7 +1914,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1928,7 +1928,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1942,7 +1942,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.java.md b/docs/certAuthBackendRole.java.md index aca1c162..d2d014d8 100644 --- a/docs/certAuthBackendRole.java.md +++ b/docs/certAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -68,24 +68,24 @@ CertAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspCaCertificates | java.lang.String | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | java.util.List | A comma-separated list of OCSP server addresses. | -| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -162,7 +162,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -255,7 +255,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -307,7 +307,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -345,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -385,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -395,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -405,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- @@ -1007,7 +1007,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1860,24 +1860,24 @@ CertAuthBackendRoleConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ocspCaCertificates | java.lang.String | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | java.util.List | A comma-separated list of OCSP server addresses. | -| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -1968,7 +1968,7 @@ public java.lang.String getCertificate(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1980,7 +1980,7 @@ public java.lang.String getName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1992,7 +1992,7 @@ public java.util.List getAllowedCommonNames(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -2004,7 +2004,7 @@ public java.util.List getAllowedDnsSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -2016,7 +2016,7 @@ public java.util.List getAllowedEmailSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -2028,7 +2028,7 @@ public java.util.List getAllowedNames(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -2040,7 +2040,7 @@ public java.util.List getAllowedOrganizationalUnits(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -2052,7 +2052,7 @@ public java.util.List getAllowedUriSans(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -2064,7 +2064,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -2076,7 +2076,7 @@ public java.lang.String getDisplayName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -2088,7 +2088,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2105,7 +2105,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -2119,7 +2119,7 @@ public java.lang.String getOcspCaCertificates(); Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -2133,7 +2133,7 @@ public java.lang.Object getOcspEnabled(); If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -2147,7 +2147,7 @@ public java.lang.Object getOcspFailOpen(); If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -2161,7 +2161,7 @@ public java.lang.Object getOcspQueryAllServers(); If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -2177,7 +2177,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -2189,7 +2189,7 @@ public java.util.List getRequiredExtensions(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -2203,7 +2203,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -2217,7 +2217,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -2231,7 +2231,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -2245,7 +2245,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -2259,7 +2259,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -2273,7 +2273,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -2287,7 +2287,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -2301,7 +2301,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -2315,7 +2315,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.python.md b/docs/certAuthBackendRole.python.md index 436876bf..cf18c8c3 100644 --- a/docs/certAuthBackendRole.python.md +++ b/docs/certAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -62,24 +62,24 @@ certAuthBackendRole.CertAuthBackendRole( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_ca_certificates | str | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocsp_enabled | typing.Union[bool, cdktf.IResolvable] | If enabled, validate certificates' revocation status using OCSP. | | ocsp_fail_open | typing.Union[bool, cdktf.IResolvable] | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocsp_query_all_servers | typing.Union[bool, cdktf.IResolvable] | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocsp_servers_override | typing.List[str] | A comma-separated list of OCSP server addresses. | -| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -156,7 +156,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -249,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -301,7 +301,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -379,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -389,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -399,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- @@ -1047,7 +1047,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1892,24 +1892,24 @@ certAuthBackendRole.CertAuthBackendRoleConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowed_common_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowed_dns_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowed_email_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowed_names | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowed_organizational_units | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowed_uri_sans | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| display_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ocsp_ca_certificates | str | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocsp_enabled | typing.Union[bool, cdktf.IResolvable] | If enabled, validate certificates' revocation status using OCSP. | | ocsp_fail_open | typing.Union[bool, cdktf.IResolvable] | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocsp_query_all_servers | typing.Union[bool, cdktf.IResolvable] | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocsp_servers_override | typing.List[str] | A comma-separated list of OCSP server addresses. | -| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| required_extensions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -2000,7 +2000,7 @@ certificate: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -2012,7 +2012,7 @@ name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -2024,7 +2024,7 @@ allowed_common_names: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -2036,7 +2036,7 @@ allowed_dns_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -2048,7 +2048,7 @@ allowed_email_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -2060,7 +2060,7 @@ allowed_names: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -2072,7 +2072,7 @@ allowed_organizational_units: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -2084,7 +2084,7 @@ allowed_uri_sans: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -2096,7 +2096,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -2108,7 +2108,7 @@ display_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -2120,7 +2120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2137,7 +2137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -2151,7 +2151,7 @@ ocsp_ca_certificates: str Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -2165,7 +2165,7 @@ ocsp_enabled: typing.Union[bool, IResolvable] If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -2179,7 +2179,7 @@ ocsp_fail_open: typing.Union[bool, IResolvable] If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -2193,7 +2193,7 @@ ocsp_query_all_servers: typing.Union[bool, IResolvable] If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -2209,7 +2209,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -2221,7 +2221,7 @@ required_extensions: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -2235,7 +2235,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -2249,7 +2249,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -2263,7 +2263,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -2277,7 +2277,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -2291,7 +2291,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -2305,7 +2305,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -2319,7 +2319,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -2333,7 +2333,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -2347,7 +2347,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/certAuthBackendRole.typescript.md b/docs/certAuthBackendRole.typescript.md index b67a3578..70f322d0 100644 --- a/docs/certAuthBackendRole.typescript.md +++ b/docs/certAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### CertAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role vault_cert_auth_backend_role}. #### Initializers @@ -642,7 +642,7 @@ The construct id used in the generated config for the CertAuthBackendRole to imp The id of the existing CertAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1452,24 +1452,24 @@ const certAuthBackendRoleConfig: certAuthBackendRole.CertAuthBackendRoleConfig = | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | -| name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | -| allowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | -| allowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | -| allowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | -| allowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | -| allowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | -| allowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | -| displayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | +| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. | +| name | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. | +| allowedCommonNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. | +| allowedDnsSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. | +| allowedEmailSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. | +| allowedNames | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. | +| allowedOrganizationalUnits | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. | +| allowedUriSans | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. | +| displayName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ocspCaCertificates | string | Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. | | ocspEnabled | boolean \| cdktf.IResolvable | If enabled, validate certificates' revocation status using OCSP. | | ocspFailOpen | boolean \| cdktf.IResolvable | If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. | | ocspQueryAllServers | boolean \| cdktf.IResolvable | If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. | | ocspServersOverride | string[] | A comma-separated list of OCSP server addresses. | -| requiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | +| requiredExtensions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | number | The maximum lifetime of the generated token. | @@ -1560,7 +1560,7 @@ public readonly certificate: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#certificate CertAuthBackendRole#certificate}. --- @@ -1572,7 +1572,7 @@ public readonly name: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#name CertAuthBackendRole#name}. --- @@ -1584,7 +1584,7 @@ public readonly allowedCommonNames: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_common_names CertAuthBackendRole#allowed_common_names}. --- @@ -1596,7 +1596,7 @@ public readonly allowedDnsSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_dns_sans CertAuthBackendRole#allowed_dns_sans}. --- @@ -1608,7 +1608,7 @@ public readonly allowedEmailSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_email_sans CertAuthBackendRole#allowed_email_sans}. --- @@ -1620,7 +1620,7 @@ public readonly allowedNames: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_names CertAuthBackendRole#allowed_names}. --- @@ -1632,7 +1632,7 @@ public readonly allowedOrganizationalUnits: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_organizational_units CertAuthBackendRole#allowed_organizational_units}. --- @@ -1644,7 +1644,7 @@ public readonly allowedUriSans: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#allowed_uri_sans CertAuthBackendRole#allowed_uri_sans}. --- @@ -1656,7 +1656,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#backend CertAuthBackendRole#backend}. --- @@ -1668,7 +1668,7 @@ public readonly displayName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#display_name CertAuthBackendRole#display_name}. --- @@ -1680,7 +1680,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#id CertAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1697,7 +1697,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#namespace CertAuthBackendRole#namespace} --- @@ -1711,7 +1711,7 @@ public readonly ocspCaCertificates: string; Any additional CA certificates needed to verify OCSP responses. Provided as base64 encoded PEM data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_ca_certificates CertAuthBackendRole#ocsp_ca_certificates} --- @@ -1725,7 +1725,7 @@ public readonly ocspEnabled: boolean | IResolvable; If enabled, validate certificates' revocation status using OCSP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_enabled CertAuthBackendRole#ocsp_enabled} --- @@ -1739,7 +1739,7 @@ public readonly ocspFailOpen: boolean | IResolvable; If true and an OCSP response cannot be fetched or is of an unknown status, the login will proceed as if the certificate has not been revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_fail_open CertAuthBackendRole#ocsp_fail_open} --- @@ -1753,7 +1753,7 @@ public readonly ocspQueryAllServers: boolean | IResolvable; If set to true, rather than accepting the first successful OCSP response, query all servers and consider the certificate valid only if all servers agree. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_query_all_servers CertAuthBackendRole#ocsp_query_all_servers} --- @@ -1769,7 +1769,7 @@ A comma-separated list of OCSP server addresses. If unset, the OCSP server is determined from the AuthorityInformationAccess extension on the certificate being inspected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#ocsp_servers_override CertAuthBackendRole#ocsp_servers_override} --- @@ -1781,7 +1781,7 @@ public readonly requiredExtensions: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#required_extensions CertAuthBackendRole#required_extensions}. --- @@ -1795,7 +1795,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_bound_cidrs CertAuthBackendRole#token_bound_cidrs} --- @@ -1809,7 +1809,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_explicit_max_ttl CertAuthBackendRole#token_explicit_max_ttl} --- @@ -1823,7 +1823,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_max_ttl CertAuthBackendRole#token_max_ttl} --- @@ -1837,7 +1837,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_no_default_policy CertAuthBackendRole#token_no_default_policy} --- @@ -1851,7 +1851,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_num_uses CertAuthBackendRole#token_num_uses} --- @@ -1865,7 +1865,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_period CertAuthBackendRole#token_period} --- @@ -1879,7 +1879,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_policies CertAuthBackendRole#token_policies} --- @@ -1893,7 +1893,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_ttl CertAuthBackendRole#token_ttl} --- @@ -1907,7 +1907,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/cert_auth_backend_role#token_type CertAuthBackendRole#token_type} --- diff --git a/docs/configUiCustomMessage.csharp.md b/docs/configUiCustomMessage.csharp.md index e31f766a..b4b2b45a 100644 --- a/docs/configUiCustomMessage.csharp.md +++ b/docs/configUiCustomMessage.csharp.md @@ -4,7 +4,7 @@ ### ConfigUiCustomMessage -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. #### Initializers @@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i The id of the existing ConfigUiCustomMessage that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use --- @@ -1056,7 +1056,7 @@ public string MessageBase64 { get; set; } The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -1070,7 +1070,7 @@ public string StartTime { get; set; } The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -1084,7 +1084,7 @@ public string Title { get; set; } The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -1098,7 +1098,7 @@ public object Authenticated { get; set; } A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -1112,7 +1112,7 @@ public string EndTime { get; set; } The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -1126,7 +1126,7 @@ public ConfigUiCustomMessageLink Link { get; set; } link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -1140,7 +1140,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -1154,7 +1154,7 @@ public System.Collections.Generic.IDictionary Options { get; set A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -1168,7 +1168,7 @@ public string Type { get; set; } The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -1204,7 +1204,7 @@ public string Href { get; set; } The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -1218,7 +1218,7 @@ public string Title { get; set; } The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- diff --git a/docs/configUiCustomMessage.go.md b/docs/configUiCustomMessage.go.md index ec797ee0..77a6dc25 100644 --- a/docs/configUiCustomMessage.go.md +++ b/docs/configUiCustomMessage.go.md @@ -4,7 +4,7 @@ ### ConfigUiCustomMessage -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. #### Initializers @@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i The id of the existing ConfigUiCustomMessage that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use --- @@ -1056,7 +1056,7 @@ MessageBase64 *string The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -1070,7 +1070,7 @@ StartTime *string The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -1084,7 +1084,7 @@ Title *string The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -1098,7 +1098,7 @@ Authenticated interface{} A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -1112,7 +1112,7 @@ EndTime *string The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -1126,7 +1126,7 @@ Link ConfigUiCustomMessageLink link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -1140,7 +1140,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -1154,7 +1154,7 @@ Options *map[string]*string A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -1168,7 +1168,7 @@ Type *string The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -1204,7 +1204,7 @@ Href *string The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -1218,7 +1218,7 @@ Title *string The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- diff --git a/docs/configUiCustomMessage.java.md b/docs/configUiCustomMessage.java.md index 20a12a54..20c63179 100644 --- a/docs/configUiCustomMessage.java.md +++ b/docs/configUiCustomMessage.java.md @@ -4,7 +4,7 @@ ### ConfigUiCustomMessage -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. #### Initializers @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -687,7 +687,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i The id of the existing ConfigUiCustomMessage that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use --- @@ -1226,7 +1226,7 @@ public java.lang.String getMessageBase64(); The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -1240,7 +1240,7 @@ public java.lang.String getStartTime(); The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -1254,7 +1254,7 @@ public java.lang.String getTitle(); The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -1268,7 +1268,7 @@ public java.lang.Object getAuthenticated(); A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -1282,7 +1282,7 @@ public java.lang.String getEndTime(); The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -1296,7 +1296,7 @@ public ConfigUiCustomMessageLink getLink(); link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -1310,7 +1310,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -1324,7 +1324,7 @@ public java.util.Map getOptions(); A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -1338,7 +1338,7 @@ public java.lang.String getType(); The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -1374,7 +1374,7 @@ public java.lang.String getHref(); The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -1388,7 +1388,7 @@ public java.lang.String getTitle(); The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- diff --git a/docs/configUiCustomMessage.python.md b/docs/configUiCustomMessage.python.md index f62f695d..4892e98f 100644 --- a/docs/configUiCustomMessage.python.md +++ b/docs/configUiCustomMessage.python.md @@ -4,7 +4,7 @@ ### ConfigUiCustomMessage -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. #### Initializers @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -583,7 +583,7 @@ def put_link( The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -593,7 +593,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -747,7 +747,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i The id of the existing ConfigUiCustomMessage that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use --- @@ -1281,7 +1281,7 @@ message_base64: str The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -1295,7 +1295,7 @@ start_time: str The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -1309,7 +1309,7 @@ title: str The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -1323,7 +1323,7 @@ authenticated: typing.Union[bool, IResolvable] A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -1337,7 +1337,7 @@ end_time: str The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -1351,7 +1351,7 @@ link: ConfigUiCustomMessageLink link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -1365,7 +1365,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -1379,7 +1379,7 @@ options: typing.Mapping[str] A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -1393,7 +1393,7 @@ type: str The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -1429,7 +1429,7 @@ href: str The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -1443,7 +1443,7 @@ title: str The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- diff --git a/docs/configUiCustomMessage.typescript.md b/docs/configUiCustomMessage.typescript.md index 2db9ea6d..fe123c9d 100644 --- a/docs/configUiCustomMessage.typescript.md +++ b/docs/configUiCustomMessage.typescript.md @@ -4,7 +4,7 @@ ### ConfigUiCustomMessage -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message vault_config_ui_custom_message}. #### Initializers @@ -522,7 +522,7 @@ The construct id used in the generated config for the ConfigUiCustomMessage to i The id of the existing ConfigUiCustomMessage that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ public readonly messageBase64: string; The base64-encoded content of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#message_base64 ConfigUiCustomMessage#message_base64} --- @@ -1053,7 +1053,7 @@ public readonly startTime: string; The starting time of the active period of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#start_time ConfigUiCustomMessage#start_time} --- @@ -1067,7 +1067,7 @@ public readonly title: string; The title of the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- @@ -1081,7 +1081,7 @@ public readonly authenticated: boolean | IResolvable; A flag indicating whether the custom message is displayed pre-login (false) or post-login (true). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#authenticated ConfigUiCustomMessage#authenticated} --- @@ -1095,7 +1095,7 @@ public readonly endTime: string; The ending time of the active period of the custom message. Can be omitted for non-expiring message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#end_time ConfigUiCustomMessage#end_time} --- @@ -1109,7 +1109,7 @@ public readonly link: ConfigUiCustomMessageLink; link block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#link ConfigUiCustomMessage#link} --- @@ -1123,7 +1123,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#namespace ConfigUiCustomMessage#namespace} --- @@ -1137,7 +1137,7 @@ public readonly options: {[ key: string ]: string}; A map containing additional options for the custom message. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#options ConfigUiCustomMessage#options} --- @@ -1151,7 +1151,7 @@ public readonly type: string; The display type of custom message. Allowed values are banner and modal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#type ConfigUiCustomMessage#type} --- @@ -1184,7 +1184,7 @@ public readonly href: string; The URL of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#href ConfigUiCustomMessage#href} --- @@ -1198,7 +1198,7 @@ public readonly title: string; The title of the hyperlink. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/config_ui_custom_message#title ConfigUiCustomMessage#title} --- diff --git a/docs/consulSecretBackend.csharp.md b/docs/consulSecretBackend.csharp.md index e06ae3a4..0343c796 100644 --- a/docs/consulSecretBackend.csharp.md +++ b/docs/consulSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1142,7 +1142,7 @@ new ConsulSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | Local | object | Specifies if the secret backend is local only. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1232,7 +1232,7 @@ public string Address { get; set; } Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1262,7 +1262,7 @@ public string CaCert { get; set; } CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1276,7 +1276,7 @@ public string ClientCert { get; set; } Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1290,7 +1290,7 @@ public string ClientKey { get; set; } Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1304,7 +1304,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1318,7 +1318,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1332,7 +1332,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1344,7 +1344,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1361,7 +1361,7 @@ public object Local { get; set; } Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1375,7 +1375,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1389,7 +1389,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1403,7 +1403,7 @@ public string Path { get; set; } Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1417,7 +1417,7 @@ public string Scheme { get; set; } Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1431,7 +1431,7 @@ public string Token { get; set; } Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.go.md b/docs/consulSecretBackend.go.md index 3e86b456..05529adc 100644 --- a/docs/consulSecretBackend.go.md +++ b/docs/consulSecretBackend.go.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1142,7 +1142,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | Local | interface{} | Specifies if the secret backend is local only. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1232,7 +1232,7 @@ Address *string Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1248,7 +1248,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1262,7 +1262,7 @@ CaCert *string CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1276,7 +1276,7 @@ ClientCert *string Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1290,7 +1290,7 @@ ClientKey *string Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1304,7 +1304,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1318,7 +1318,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1332,7 +1332,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1344,7 +1344,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1361,7 +1361,7 @@ Local interface{} Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1375,7 +1375,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1389,7 +1389,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1403,7 +1403,7 @@ Path *string Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1417,7 +1417,7 @@ Scheme *string Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1431,7 +1431,7 @@ Token *string Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.java.md b/docs/consulSecretBackend.java.md index b9171863..64e27822 100644 --- a/docs/consulSecretBackend.java.md +++ b/docs/consulSecretBackend.java.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -63,7 +63,7 @@ ConsulSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -139,7 +139,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -151,7 +151,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -232,7 +232,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- @@ -807,7 +807,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1391,7 +1391,7 @@ ConsulSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1481,7 +1481,7 @@ public java.lang.String getAddress(); Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1497,7 +1497,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1511,7 +1511,7 @@ public java.lang.String getCaCert(); CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1525,7 +1525,7 @@ public java.lang.String getClientCert(); Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1539,7 +1539,7 @@ public java.lang.String getClientKey(); Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1553,7 +1553,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1567,7 +1567,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1581,7 +1581,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1593,7 +1593,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1610,7 +1610,7 @@ public java.lang.Object getLocal(); Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1624,7 +1624,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1638,7 +1638,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1652,7 +1652,7 @@ public java.lang.String getPath(); Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1666,7 +1666,7 @@ public java.lang.String getScheme(); Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1680,7 +1680,7 @@ public java.lang.String getToken(); Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.python.md b/docs/consulSecretBackend.python.md index 123d28c1..3ac866b3 100644 --- a/docs/consulSecretBackend.python.md +++ b/docs/consulSecretBackend.python.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ consulSecretBackend.ConsulSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the secret backend is local only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -146,7 +146,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -227,7 +227,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -237,7 +237,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- @@ -848,7 +848,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1425,7 +1425,7 @@ consulSecretBackend.ConsulSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the secret backend is local only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1515,7 +1515,7 @@ address: str Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1531,7 +1531,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1545,7 +1545,7 @@ ca_cert: str CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1559,7 +1559,7 @@ client_cert: str Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1573,7 +1573,7 @@ client_key: str Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1587,7 +1587,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1601,7 +1601,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1615,7 +1615,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1627,7 +1627,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1644,7 +1644,7 @@ local: typing.Union[bool, IResolvable] Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1658,7 +1658,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1672,7 +1672,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1686,7 +1686,7 @@ path: str Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1700,7 +1700,7 @@ scheme: str Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1714,7 +1714,7 @@ token: str Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackend.typescript.md b/docs/consulSecretBackend.typescript.md index fa471f63..5512aaa1 100644 --- a/docs/consulSecretBackend.typescript.md +++ b/docs/consulSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### ConsulSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend vault_consul_secret_backend}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the ConsulSecretBackend to imp The id of the existing ConsulSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1119,7 +1119,7 @@ const consulSecretBackendConfig: consulSecretBackend.ConsulSecretBackendConfig = | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. | | local | boolean \| cdktf.IResolvable | Specifies if the secret backend is local only. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1209,7 +1209,7 @@ public readonly address: string; Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#address ConsulSecretBackend#address} --- @@ -1225,7 +1225,7 @@ Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#bootstrap ConsulSecretBackend#bootstrap} --- @@ -1239,7 +1239,7 @@ public readonly caCert: string; CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#ca_cert ConsulSecretBackend#ca_cert} --- @@ -1253,7 +1253,7 @@ public readonly clientCert: string; Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_cert ConsulSecretBackend#client_cert} --- @@ -1267,7 +1267,7 @@ public readonly clientKey: string; Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#client_key ConsulSecretBackend#client_key} --- @@ -1281,7 +1281,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#default_lease_ttl_seconds ConsulSecretBackend#default_lease_ttl_seconds} --- @@ -1295,7 +1295,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#description ConsulSecretBackend#description} --- @@ -1309,7 +1309,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#disable_remount ConsulSecretBackend#disable_remount} --- @@ -1321,7 +1321,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#id ConsulSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1338,7 +1338,7 @@ public readonly local: boolean | IResolvable; Specifies if the secret backend is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#local ConsulSecretBackend#local} --- @@ -1352,7 +1352,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#max_lease_ttl_seconds ConsulSecretBackend#max_lease_ttl_seconds} --- @@ -1366,7 +1366,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#namespace ConsulSecretBackend#namespace} --- @@ -1380,7 +1380,7 @@ public readonly path: string; Unique name of the Vault Consul mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#path ConsulSecretBackend#path} --- @@ -1394,7 +1394,7 @@ public readonly scheme: string; Specifies the URL scheme to use. Defaults to "http". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#scheme ConsulSecretBackend#scheme} --- @@ -1408,7 +1408,7 @@ public readonly token: string; Specifies the Consul token to use when managing or issuing new tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend#token ConsulSecretBackend#token} --- diff --git a/docs/consulSecretBackendRole.csharp.md b/docs/consulSecretBackendRole.csharp.md index 48622bdf..951af018 100644 --- a/docs/consulSecretBackendRole.csharp.md +++ b/docs/consulSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1109,7 +1109,7 @@ new ConsulSecretBackendRoleConfig { | ConsulNamespace | string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | ConsulPolicies | string[] | List of Consul policies to associate with this role. | | ConsulRoles | string[] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | Local | object | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | MaxTtl | double | Maximum TTL for leases associated with this role, in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1201,7 +1201,7 @@ public string Name { get; set; } The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1215,7 +1215,7 @@ public string Backend { get; set; } The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1229,7 +1229,7 @@ public string ConsulNamespace { get; set; } The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1243,7 +1243,7 @@ public string[] ConsulPolicies { get; set; } List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1257,7 +1257,7 @@ public string[] ConsulRoles { get; set; } Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1269,7 +1269,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1286,7 +1286,7 @@ public object Local { get; set; } Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1300,7 +1300,7 @@ public double MaxTtl { get; set; } Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1314,7 +1314,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1328,7 +1328,7 @@ public string[] NodeIdentities { get; set; } Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1342,7 +1342,7 @@ public string Partition { get; set; } The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1356,7 +1356,7 @@ public string[] Policies { get; set; } List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1370,7 +1370,7 @@ public string[] ServiceIdentities { get; set; } Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1384,7 +1384,7 @@ public double Ttl { get; set; } Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.go.md b/docs/consulSecretBackendRole.go.md index b33a2903..1f70c6fc 100644 --- a/docs/consulSecretBackendRole.go.md +++ b/docs/consulSecretBackendRole.go.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1109,7 +1109,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/consulsecretbackendro | ConsulNamespace | *string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | ConsulPolicies | *[]*string | List of Consul policies to associate with this role. | | ConsulRoles | *[]*string | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | Local | interface{} | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | MaxTtl | *f64 | Maximum TTL for leases associated with this role, in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1201,7 +1201,7 @@ Name *string The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1215,7 +1215,7 @@ Backend *string The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1229,7 +1229,7 @@ ConsulNamespace *string The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1243,7 +1243,7 @@ ConsulPolicies *[]*string List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1257,7 +1257,7 @@ ConsulRoles *[]*string Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1269,7 +1269,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1286,7 +1286,7 @@ Local interface{} Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1300,7 +1300,7 @@ MaxTtl *f64 Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1314,7 +1314,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1328,7 +1328,7 @@ NodeIdentities *[]*string Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1342,7 +1342,7 @@ Partition *string The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1356,7 +1356,7 @@ Policies *[]*string List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1370,7 +1370,7 @@ ServiceIdentities *[]*string Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1384,7 +1384,7 @@ Ttl *f64 Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.java.md b/docs/consulSecretBackendRole.java.md index bf89ccef..00630933 100644 --- a/docs/consulSecretBackendRole.java.md +++ b/docs/consulSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -57,7 +57,7 @@ ConsulSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | consulNamespace | java.lang.String | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | java.util.List | List of Consul policies to associate with this role. | | consulRoles | java.util.List | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -196,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- @@ -784,7 +784,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1340,7 +1340,7 @@ ConsulSecretBackendRoleConfig.builder() | consulNamespace | java.lang.String | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | java.util.List | List of Consul policies to associate with this role. | | consulRoles | java.util.List | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1432,7 +1432,7 @@ public java.lang.String getName(); The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1446,7 +1446,7 @@ public java.lang.String getBackend(); The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1460,7 +1460,7 @@ public java.lang.String getConsulNamespace(); The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1474,7 +1474,7 @@ public java.util.List getConsulPolicies(); List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1488,7 +1488,7 @@ public java.util.List getConsulRoles(); Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1500,7 +1500,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1517,7 +1517,7 @@ public java.lang.Object getLocal(); Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1531,7 +1531,7 @@ public java.lang.Number getMaxTtl(); Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1545,7 +1545,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1559,7 +1559,7 @@ public java.util.List getNodeIdentities(); Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1573,7 +1573,7 @@ public java.lang.String getPartition(); The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1587,7 +1587,7 @@ public java.util.List getPolicies(); List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1601,7 +1601,7 @@ public java.util.List getServiceIdentities(); Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1615,7 +1615,7 @@ public java.lang.Number getTtl(); Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.python.md b/docs/consulSecretBackendRole.python.md index 22eea240..79f89d67 100644 --- a/docs/consulSecretBackendRole.python.md +++ b/docs/consulSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -54,7 +54,7 @@ consulSecretBackendRole.ConsulSecretBackendRole( | consul_namespace | str | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consul_policies | typing.List[str] | List of Consul policies to associate with this role. | | consul_roles | typing.List[str] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -193,7 +193,7 @@ If you experience problems setting this value it might not be settable. Please t Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- @@ -827,7 +827,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1378,7 +1378,7 @@ consulSecretBackendRole.ConsulSecretBackendRoleConfig( | consul_namespace | str | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consul_policies | typing.List[str] | List of Consul policies to associate with this role. | | consul_roles | typing.List[str] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1470,7 +1470,7 @@ name: str The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1484,7 +1484,7 @@ backend: str The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1498,7 +1498,7 @@ consul_namespace: str The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1512,7 +1512,7 @@ consul_policies: typing.List[str] List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1526,7 +1526,7 @@ consul_roles: typing.List[str] Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1538,7 +1538,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1555,7 +1555,7 @@ local: typing.Union[bool, IResolvable] Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1569,7 +1569,7 @@ max_ttl: typing.Union[int, float] Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1583,7 +1583,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1597,7 +1597,7 @@ node_identities: typing.List[str] Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1611,7 +1611,7 @@ partition: str The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1625,7 +1625,7 @@ policies: typing.List[str] List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1639,7 +1639,7 @@ service_identities: typing.List[str] Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1653,7 +1653,7 @@ ttl: typing.Union[int, float] Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/consulSecretBackendRole.typescript.md b/docs/consulSecretBackendRole.typescript.md index e86aa76e..f5ef58e8 100644 --- a/docs/consulSecretBackendRole.typescript.md +++ b/docs/consulSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### ConsulSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the ConsulSecretBackendRole to The id of the existing ConsulSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1087,7 +1087,7 @@ const consulSecretBackendRoleConfig: consulSecretBackendRole.ConsulSecretBackend | consulNamespace | string | The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. | | consulPolicies | string[] | List of Consul policies to associate with this role. | | consulRoles | string[] | Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. | | local | boolean \| cdktf.IResolvable | Indicates that the token should not be replicated globally and instead be local to the current datacenter. | | maxTtl | number | Maximum TTL for leases associated with this role, in seconds. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1179,7 +1179,7 @@ public readonly name: string; The name of an existing role against which to create this Consul credential. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} --- @@ -1193,7 +1193,7 @@ public readonly backend: string; The path of the Consul Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} --- @@ -1207,7 +1207,7 @@ public readonly consulNamespace: string; The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} --- @@ -1221,7 +1221,7 @@ public readonly consulPolicies: string[]; List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} --- @@ -1235,7 +1235,7 @@ public readonly consulRoles: string[]; Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} --- @@ -1247,7 +1247,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1264,7 +1264,7 @@ public readonly local: boolean | IResolvable; Indicates that the token should not be replicated globally and instead be local to the current datacenter. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} --- @@ -1278,7 +1278,7 @@ public readonly maxTtl: number; Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} --- @@ -1292,7 +1292,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} --- @@ -1306,7 +1306,7 @@ public readonly nodeIdentities: string[]; Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} --- @@ -1320,7 +1320,7 @@ public readonly partition: string; The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} --- @@ -1334,7 +1334,7 @@ public readonly policies: string[]; List of Consul policies to associate with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} --- @@ -1348,7 +1348,7 @@ public readonly serviceIdentities: string[]; Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} --- @@ -1362,7 +1362,7 @@ public readonly ttl: number; Specifies the TTL for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} --- diff --git a/docs/dataVaultAdAccessCredentials.csharp.md b/docs/dataVaultAdAccessCredentials.csharp.md index c7e65992..23aac32b 100644 --- a/docs/dataVaultAdAccessCredentials.csharp.md +++ b/docs/dataVaultAdAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ new DataVaultAdAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AD Secret Backend to read credentials from. | | Role | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ public string Backend { get; set; } AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -807,7 +807,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -819,7 +819,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.go.md b/docs/dataVaultAdAccessCredentials.go.md index 7ca7d621..bd6f74d1 100644 --- a/docs/dataVaultAdAccessCredentials.go.md +++ b/docs/dataVaultAdAccessCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultadaccesscred | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AD Secret Backend to read credentials from. | | Role | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ Backend *string AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -807,7 +807,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -819,7 +819,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.java.md b/docs/dataVaultAdAccessCredentials.java.md index 75930d3c..b6c417df 100644 --- a/docs/dataVaultAdAccessCredentials.java.md +++ b/docs/dataVaultAdAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultAdAccessCredentials.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AD Secret Backend to read credentials from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -815,7 +815,7 @@ DataVaultAdAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AD Secret Backend to read credentials from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -900,7 +900,7 @@ public java.lang.String getBackend(); AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -914,7 +914,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -926,7 +926,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.python.md b/docs/dataVaultAdAccessCredentials.python.md index 733f6295..61a0476f 100644 --- a/docs/dataVaultAdAccessCredentials.python.md +++ b/docs/dataVaultAdAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AD Secret Backend to read credentials from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -845,7 +845,7 @@ dataVaultAdAccessCredentials.DataVaultAdAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AD Secret Backend to read credentials from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -930,7 +930,7 @@ backend: str AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -944,7 +944,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -956,7 +956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultAdAccessCredentials.typescript.md b/docs/dataVaultAdAccessCredentials.typescript.md index 1dacd768..15655790 100644 --- a/docs/dataVaultAdAccessCredentials.typescript.md +++ b/docs/dataVaultAdAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAdAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials vault_ad_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAdAccessCredentia The id of the existing DataVaultAdAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -696,7 +696,7 @@ const dataVaultAdAccessCredentialsConfig: dataVaultAdAccessCredentials.DataVault | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AD Secret Backend to read credentials from. | | role | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -781,7 +781,7 @@ public readonly backend: string; AD Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#backend DataVaultAdAccessCredentials#backend} --- @@ -795,7 +795,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#role DataVaultAdAccessCredentials#role} --- @@ -807,7 +807,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#id DataVaultAdAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -824,7 +824,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ad_access_credentials#namespace DataVaultAdAccessCredentials#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.csharp.md b/docs/dataVaultApproleAuthBackendRoleId.csharp.md index a0125d5c..78363f4a 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.csharp.md +++ b/docs/dataVaultApproleAuthBackendRoleId.csharp.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +693,7 @@ new DataVaultApproleAuthBackendRoleIdConfig { | Provisioners | object[] | *No description.* | | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -778,7 +778,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -792,7 +792,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -804,7 +804,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -821,7 +821,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.go.md b/docs/dataVaultApproleAuthBackendRoleId.go.md index c84c0898..498db9f1 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.go.md +++ b/docs/dataVaultApproleAuthBackendRoleId.go.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -693,7 +693,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultapproleauthb | Provisioners | *[]interface{} | *No description.* | | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -778,7 +778,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -792,7 +792,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -804,7 +804,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -821,7 +821,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.java.md b/docs/dataVaultApproleAuthBackendRoleId.java.md index 395b7501..df05f0ab 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.java.md +++ b/docs/dataVaultApproleAuthBackendRoleId.java.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -43,7 +43,7 @@ DataVaultApproleAuthBackendRoleId.Builder.create(Construct scope, java.lang.Stri | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- @@ -489,7 +489,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -800,7 +800,7 @@ DataVaultApproleAuthBackendRoleIdConfig.builder() | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -885,7 +885,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -899,7 +899,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -911,7 +911,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.python.md b/docs/dataVaultApproleAuthBackendRoleId.python.md index 0195510c..e0c0d385 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.python.md +++ b/docs/dataVaultApproleAuthBackendRoleId.python.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -41,7 +41,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleId( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- @@ -523,7 +523,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ dataVaultApproleAuthBackendRoleId.DataVaultApproleAuthBackendRoleIdConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -929,7 +929,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -941,7 +941,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultApproleAuthBackendRoleId.typescript.md b/docs/dataVaultApproleAuthBackendRoleId.typescript.md index 7ffe476a..1d9d3e9b 100644 --- a/docs/dataVaultApproleAuthBackendRoleId.typescript.md +++ b/docs/dataVaultApproleAuthBackendRoleId.typescript.md @@ -4,7 +4,7 @@ ### DataVaultApproleAuthBackendRoleId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id vault_approle_auth_backend_role_id}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultApproleAuthBacken The id of the existing DataVaultApproleAuthBackendRoleId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#import import section} in the documentation of this resource for the id to use --- @@ -681,7 +681,7 @@ const dataVaultApproleAuthBackendRoleIdConfig: dataVaultApproleAuthBackendRoleId | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -766,7 +766,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#role_name DataVaultApproleAuthBackendRoleId#role_name} --- @@ -780,7 +780,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#backend DataVaultApproleAuthBackendRoleId#backend} --- @@ -792,7 +792,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#id DataVaultApproleAuthBackendRoleId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -809,7 +809,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/approle_auth_backend_role_id#namespace DataVaultApproleAuthBackendRoleId#namespace} --- diff --git a/docs/dataVaultAuthBackend.csharp.md b/docs/dataVaultAuthBackend.csharp.md index 5a7b0db6..dd0bf810 100644 --- a/docs/dataVaultAuthBackend.csharp.md +++ b/docs/dataVaultAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -728,7 +728,7 @@ new DataVaultAuthBackendConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | The auth backend mount point. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -813,7 +813,7 @@ public string Path { get; set; } The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -825,7 +825,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -842,7 +842,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.go.md b/docs/dataVaultAuthBackend.go.md index 4d69ddb3..b6536d87 100644 --- a/docs/dataVaultAuthBackend.go.md +++ b/docs/dataVaultAuthBackend.go.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -728,7 +728,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackend" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | The auth backend mount point. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -813,7 +813,7 @@ Path *string The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -825,7 +825,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -842,7 +842,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.java.md b/docs/dataVaultAuthBackend.java.md index a83d2dd6..1580d690 100644 --- a/docs/dataVaultAuthBackend.java.md +++ b/docs/dataVaultAuthBackend.java.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -41,7 +41,7 @@ DataVaultAuthBackend.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | The auth backend mount point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ DataVaultAuthBackendConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | The auth backend mount point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ public java.lang.String getPath(); The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -920,7 +920,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -937,7 +937,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.python.md b/docs/dataVaultAuthBackend.python.md index 886467d2..a2a809dc 100644 --- a/docs/dataVaultAuthBackend.python.md +++ b/docs/dataVaultAuthBackend.python.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -39,7 +39,7 @@ dataVaultAuthBackend.DataVaultAuthBackend( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | The auth backend mount point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -853,7 +853,7 @@ dataVaultAuthBackend.DataVaultAuthBackendConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | The auth backend mount point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -938,7 +938,7 @@ path: str The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -950,7 +950,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackend.typescript.md b/docs/dataVaultAuthBackend.typescript.md index 34e93868..29d2541c 100644 --- a/docs/dataVaultAuthBackend.typescript.md +++ b/docs/dataVaultAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend vault_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend vault_auth_backend}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAuthBackend to im The id of the existing DataVaultAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -717,7 +717,7 @@ const dataVaultAuthBackendConfig: dataVaultAuthBackend.DataVaultAuthBackendConfi | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | The auth backend mount point. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -802,7 +802,7 @@ public readonly path: string; The auth backend mount point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#path DataVaultAuthBackend#path} --- @@ -814,7 +814,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#id DataVaultAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -831,7 +831,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backend#namespace DataVaultAuthBackend#namespace} --- diff --git a/docs/dataVaultAuthBackends.csharp.md b/docs/dataVaultAuthBackends.csharp.md index ed119c9b..588739d4 100644 --- a/docs/dataVaultAuthBackends.csharp.md +++ b/docs/dataVaultAuthBackends.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -679,7 +679,7 @@ new DataVaultAuthBackendsConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Type | string | The type of the auth backend. | @@ -763,7 +763,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -780,7 +780,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -794,7 +794,7 @@ public string Type { get; set; } The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.go.md b/docs/dataVaultAuthBackends.go.md index ba8d7cd7..a9cf63ba 100644 --- a/docs/dataVaultAuthBackends.go.md +++ b/docs/dataVaultAuthBackends.go.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -679,7 +679,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultauthbackends | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Type | *string | The type of the auth backend. | @@ -763,7 +763,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -780,7 +780,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -794,7 +794,7 @@ Type *string The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.java.md b/docs/dataVaultAuthBackends.java.md index bd82992e..fa66b16b 100644 --- a/docs/dataVaultAuthBackends.java.md +++ b/docs/dataVaultAuthBackends.java.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -40,7 +40,7 @@ DataVaultAuthBackends.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of the auth backend. | @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -123,7 +123,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- @@ -477,7 +477,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -774,7 +774,7 @@ DataVaultAuthBackendsConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | type | java.lang.String | The type of the auth backend. | @@ -858,7 +858,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -875,7 +875,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -889,7 +889,7 @@ public java.lang.String getType(); The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.python.md b/docs/dataVaultAuthBackends.python.md index aab3ae67..17051223 100644 --- a/docs/dataVaultAuthBackends.python.md +++ b/docs/dataVaultAuthBackends.python.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -38,7 +38,7 @@ dataVaultAuthBackends.DataVaultAuthBackends( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of the auth backend. | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- @@ -511,7 +511,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ dataVaultAuthBackends.DataVaultAuthBackendsConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | str | Target namespace. (requires Enterprise). | | type | str | The type of the auth backend. | @@ -888,7 +888,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -905,7 +905,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -919,7 +919,7 @@ type: str The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAuthBackends.typescript.md b/docs/dataVaultAuthBackends.typescript.md index d513a821..6f030629 100644 --- a/docs/dataVaultAuthBackends.typescript.md +++ b/docs/dataVaultAuthBackends.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAuthBackends -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends vault_auth_backends}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends vault_auth_backends}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultAuthBackends to i The id of the existing DataVaultAuthBackends that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#import import section} in the documentation of this resource for the id to use --- @@ -668,7 +668,7 @@ const dataVaultAuthBackendsConfig: dataVaultAuthBackends.DataVaultAuthBackendsCo | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. | | namespace | string | Target namespace. (requires Enterprise). | | type | string | The type of the auth backend. | @@ -752,7 +752,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#id DataVaultAuthBackends#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -769,7 +769,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#namespace DataVaultAuthBackends#namespace} --- @@ -783,7 +783,7 @@ public readonly type: string; The type of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/auth_backends#type DataVaultAuthBackends#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.csharp.md b/docs/dataVaultAwsAccessCredentials.csharp.md index be5d2105..c5bda217 100644 --- a/docs/dataVaultAwsAccessCredentials.csharp.md +++ b/docs/dataVaultAwsAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ new DataVaultAwsAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AWS Secret Backend to read credentials from. | | Role | string | AWS Secret Role to read credentials from. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Region | string | Region the read credentials belong to. | | RoleArn | string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -961,7 +961,7 @@ public string Backend { get; set; } AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -975,7 +975,7 @@ public string Role { get; set; } AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -987,7 +987,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1018,7 +1018,7 @@ public string Region { get; set; } Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1032,7 +1032,7 @@ public string RoleArn { get; set; } ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1046,7 +1046,7 @@ public string Ttl { get; set; } User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1060,7 +1060,7 @@ public string Type { get; set; } Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.go.md b/docs/dataVaultAwsAccessCredentials.go.md index 6dd3a0ec..4b502cdf 100644 --- a/docs/dataVaultAwsAccessCredentials.go.md +++ b/docs/dataVaultAwsAccessCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsaccesscre | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AWS Secret Backend to read credentials from. | | Role | *string | AWS Secret Role to read credentials from. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Region | *string | Region the read credentials belong to. | | RoleArn | *string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -961,7 +961,7 @@ Backend *string AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -975,7 +975,7 @@ Role *string AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -987,7 +987,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1018,7 +1018,7 @@ Region *string Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1032,7 +1032,7 @@ RoleArn *string ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1046,7 +1046,7 @@ Ttl *string User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1060,7 +1060,7 @@ Type *string Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.java.md b/docs/dataVaultAwsAccessCredentials.java.md index 9bb75b7e..307482cd 100644 --- a/docs/dataVaultAwsAccessCredentials.java.md +++ b/docs/dataVaultAwsAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -47,7 +47,7 @@ DataVaultAwsAccessCredentials.Builder.create(Construct scope, java.lang.String i | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | role | java.lang.String | AWS Secret Role to read credentials from. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region the read credentials belong to. | | roleArn | java.lang.String | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- @@ -558,7 +558,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ DataVaultAwsAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | role | java.lang.String | AWS Secret Role to read credentials from. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | region | java.lang.String | Region the read credentials belong to. | | roleArn | java.lang.String | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -1116,7 +1116,7 @@ public java.lang.String getBackend(); AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -1130,7 +1130,7 @@ public java.lang.String getRole(); AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -1142,7 +1142,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1159,7 +1159,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1173,7 +1173,7 @@ public java.lang.String getRegion(); Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1187,7 +1187,7 @@ public java.lang.String getRoleArn(); ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1201,7 +1201,7 @@ public java.lang.String getTtl(); User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1215,7 +1215,7 @@ public java.lang.String getType(); Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.python.md b/docs/dataVaultAwsAccessCredentials.python.md index cac9e664..ab7801c8 100644 --- a/docs/dataVaultAwsAccessCredentials.python.md +++ b/docs/dataVaultAwsAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -45,7 +45,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | role | str | AWS Secret Role to read credentials from. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region the read credentials belong to. | | role_arn | str | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -151,7 +151,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- @@ -592,7 +592,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1057,7 +1057,7 @@ dataVaultAwsAccessCredentials.DataVaultAwsAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | role | str | AWS Secret Role to read credentials from. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | | region | str | Region the read credentials belong to. | | role_arn | str | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -1146,7 +1146,7 @@ backend: str AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -1160,7 +1160,7 @@ role: str AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -1172,7 +1172,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1189,7 +1189,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1203,7 +1203,7 @@ region: str Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1217,7 +1217,7 @@ role_arn: str ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1231,7 +1231,7 @@ ttl: str User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1245,7 +1245,7 @@ type: str Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsAccessCredentials.typescript.md b/docs/dataVaultAwsAccessCredentials.typescript.md index 9a750fe9..6416223b 100644 --- a/docs/dataVaultAwsAccessCredentials.typescript.md +++ b/docs/dataVaultAwsAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAwsAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials vault_aws_access_credentials}. #### Initializers @@ -407,7 +407,7 @@ The construct id used in the generated config for the DataVaultAwsAccessCredenti The id of the existing DataVaultAwsAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -856,7 +856,7 @@ const dataVaultAwsAccessCredentialsConfig: dataVaultAwsAccessCredentials.DataVau | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AWS Secret Backend to read credentials from. | | role | string | AWS Secret Role to read credentials from. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | | region | string | Region the read credentials belong to. | | roleArn | string | ARN to use if multiple are available in the role. Required if the role has multiple ARNs. | @@ -945,7 +945,7 @@ public readonly backend: string; AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#backend DataVaultAwsAccessCredentials#backend} --- @@ -959,7 +959,7 @@ public readonly role: string; AWS Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role DataVaultAwsAccessCredentials#role} --- @@ -971,7 +971,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#id DataVaultAwsAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -988,7 +988,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#namespace DataVaultAwsAccessCredentials#namespace} --- @@ -1002,7 +1002,7 @@ public readonly region: string; Region the read credentials belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#region DataVaultAwsAccessCredentials#region} --- @@ -1016,7 +1016,7 @@ public readonly roleArn: string; ARN to use if multiple are available in the role. Required if the role has multiple ARNs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#role_arn DataVaultAwsAccessCredentials#role_arn} --- @@ -1030,7 +1030,7 @@ public readonly ttl: string; User specified Time-To-Live for the STS token. Uses the Role defined default_sts_ttl when not specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#ttl DataVaultAwsAccessCredentials#ttl} --- @@ -1044,7 +1044,7 @@ public readonly type: string; Type of credentials to read. Must be either 'creds' for Access Key and Secret Key, or 'sts' for STS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_access_credentials#type DataVaultAwsAccessCredentials#type} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.csharp.md b/docs/dataVaultAwsStaticAccessCredentials.csharp.md index dd9f775e..e7db3293 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.csharp.md +++ b/docs/dataVaultAwsStaticAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ new DataVaultAwsStaticAccessCredentialsConfig { | Provisioners | object[] | *No description.* | | Backend | string | AWS Secret Backend to read credentials from. | | Name | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ public string Backend { get; set; } AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -796,7 +796,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -808,7 +808,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.go.md b/docs/dataVaultAwsStaticAccessCredentials.go.md index 9d7eb85b..3a71e891 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.go.md +++ b/docs/dataVaultAwsStaticAccessCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultawsstaticacc | Provisioners | *[]interface{} | *No description.* | | Backend | *string | AWS Secret Backend to read credentials from. | | Name | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ Backend *string AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -796,7 +796,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -808,7 +808,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.java.md b/docs/dataVaultAwsStaticAccessCredentials.java.md index ee00bbe4..59b012a1 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.java.md +++ b/docs/dataVaultAwsStaticAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultAwsStaticAccessCredentials.Builder.create(Construct scope, java.lang.St | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | name | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ DataVaultAwsStaticAccessCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | AWS Secret Backend to read credentials from. | | name | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -889,7 +889,7 @@ public java.lang.String getBackend(); AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -903,7 +903,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -915,7 +915,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -932,7 +932,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.python.md b/docs/dataVaultAwsStaticAccessCredentials.python.md index 593056ab..aa25a86a 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.python.md +++ b/docs/dataVaultAwsStaticAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ dataVaultAwsStaticAccessCredentials.DataVaultAwsStaticAccessCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | AWS Secret Backend to read credentials from. | | name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ backend: str AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -933,7 +933,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -945,7 +945,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -962,7 +962,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAwsStaticAccessCredentials.typescript.md b/docs/dataVaultAwsStaticAccessCredentials.typescript.md index 00d15a3b..1f562fae 100644 --- a/docs/dataVaultAwsStaticAccessCredentials.typescript.md +++ b/docs/dataVaultAwsStaticAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAwsStaticAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials vault_aws_static_access_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultAwsStaticAccessCr The id of the existing DataVaultAwsStaticAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -685,7 +685,7 @@ const dataVaultAwsStaticAccessCredentialsConfig: dataVaultAwsStaticAccessCredent | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | AWS Secret Backend to read credentials from. | | name | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -770,7 +770,7 @@ public readonly backend: string; AWS Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#backend DataVaultAwsStaticAccessCredentials#backend} --- @@ -784,7 +784,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#name DataVaultAwsStaticAccessCredentials#name} --- @@ -796,7 +796,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#id DataVaultAwsStaticAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -813,7 +813,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/aws_static_access_credentials#namespace DataVaultAwsStaticAccessCredentials#namespace} --- diff --git a/docs/dataVaultAzureAccessCredentials.csharp.md b/docs/dataVaultAzureAccessCredentials.csharp.md index 246f663f..6abad379 100644 --- a/docs/dataVaultAzureAccessCredentials.csharp.md +++ b/docs/dataVaultAzureAccessCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ new DataVaultAzureAccessCredentialsConfig { | Backend | string | Azure Secret Backend to read credentials from. | | Role | string | Azure Secret Role to read credentials from. | | Environment | string | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | MaxCredValidationSeconds | double | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | Namespace | string | Target namespace. (requires Enterprise). | | NumSecondsBetweenTests | double | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1043,7 +1043,7 @@ public string Backend { get; set; } Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1057,7 +1057,7 @@ public string Role { get; set; } Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1071,7 +1071,7 @@ public string Environment { get; set; } The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1083,7 +1083,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1100,7 +1100,7 @@ public double MaxCredValidationSeconds { get; set; } If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1114,7 +1114,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1128,7 +1128,7 @@ public double NumSecondsBetweenTests { get; set; } If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1142,7 +1142,7 @@ public double NumSequentialSuccesses { get; set; } If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1156,7 +1156,7 @@ public string SubscriptionId { get; set; } The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1170,7 +1170,7 @@ public string TenantId { get; set; } The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1184,7 +1184,7 @@ public object ValidateCreds { get; set; } Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.go.md b/docs/dataVaultAzureAccessCredentials.go.md index 13e8afd8..a6551993 100644 --- a/docs/dataVaultAzureAccessCredentials.go.md +++ b/docs/dataVaultAzureAccessCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultazureaccessc | Backend | *string | Azure Secret Backend to read credentials from. | | Role | *string | Azure Secret Role to read credentials from. | | Environment | *string | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | MaxCredValidationSeconds | *f64 | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | Namespace | *string | Target namespace. (requires Enterprise). | | NumSecondsBetweenTests | *f64 | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1043,7 +1043,7 @@ Backend *string Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1057,7 +1057,7 @@ Role *string Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1071,7 +1071,7 @@ Environment *string The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1083,7 +1083,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1100,7 +1100,7 @@ MaxCredValidationSeconds *f64 If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1114,7 +1114,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1128,7 +1128,7 @@ NumSecondsBetweenTests *f64 If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1142,7 +1142,7 @@ NumSequentialSuccesses *f64 If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1156,7 +1156,7 @@ SubscriptionId *string The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1170,7 +1170,7 @@ TenantId *string The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1184,7 +1184,7 @@ ValidateCreds interface{} Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.java.md b/docs/dataVaultAzureAccessCredentials.java.md index 165c0130..7945c817 100644 --- a/docs/dataVaultAzureAccessCredentials.java.md +++ b/docs/dataVaultAzureAccessCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -52,7 +52,7 @@ DataVaultAzureAccessCredentials.Builder.create(Construct scope, java.lang.String | backend | java.lang.String | Azure Secret Backend to read credentials from. | | role | java.lang.String | Azure Secret Role to read credentials from. | | environment | java.lang.String | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | java.lang.Number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | java.lang.Number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -129,7 +129,7 @@ Must be unique amongst siblings in the same scope Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -170,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- @@ -616,7 +616,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1145,7 +1145,7 @@ DataVaultAzureAccessCredentialsConfig.builder() | backend | java.lang.String | Azure Secret Backend to read credentials from. | | role | java.lang.String | Azure Secret Role to read credentials from. | | environment | java.lang.String | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | java.lang.Number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | java.lang.Number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1236,7 +1236,7 @@ public java.lang.String getBackend(); Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1250,7 +1250,7 @@ public java.lang.String getRole(); Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1264,7 +1264,7 @@ public java.lang.String getEnvironment(); The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1276,7 +1276,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ public java.lang.Number getMaxCredValidationSeconds(); If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1307,7 +1307,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1321,7 +1321,7 @@ public java.lang.Number getNumSecondsBetweenTests(); If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1335,7 +1335,7 @@ public java.lang.Number getNumSequentialSuccesses(); If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1349,7 +1349,7 @@ public java.lang.String getSubscriptionId(); The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1363,7 +1363,7 @@ public java.lang.String getTenantId(); The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1377,7 +1377,7 @@ public java.lang.Object getValidateCreds(); Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.python.md b/docs/dataVaultAzureAccessCredentials.python.md index dd596a7b..d6014c78 100644 --- a/docs/dataVaultAzureAccessCredentials.python.md +++ b/docs/dataVaultAzureAccessCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -49,7 +49,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentials( | backend | str | Azure Secret Backend to read credentials from. | | role | str | Azure Secret Role to read credentials from. | | environment | str | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | max_cred_validation_seconds | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | str | Target namespace. (requires Enterprise). | | num_seconds_between_tests | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -1173,7 +1173,7 @@ dataVaultAzureAccessCredentials.DataVaultAzureAccessCredentialsConfig( | backend | str | Azure Secret Backend to read credentials from. | | role | str | Azure Secret Role to read credentials from. | | environment | str | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | max_cred_validation_seconds | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | str | Target namespace. (requires Enterprise). | | num_seconds_between_tests | typing.Union[int, float] | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1264,7 +1264,7 @@ backend: str Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1278,7 +1278,7 @@ role: str Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1292,7 +1292,7 @@ environment: str The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1304,7 +1304,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1321,7 +1321,7 @@ max_cred_validation_seconds: typing.Union[int, float] If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1335,7 +1335,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1349,7 +1349,7 @@ num_seconds_between_tests: typing.Union[int, float] If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1363,7 +1363,7 @@ num_sequential_successes: typing.Union[int, float] If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1377,7 +1377,7 @@ subscription_id: str The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1391,7 +1391,7 @@ tenant_id: str The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1405,7 +1405,7 @@ validate_creds: typing.Union[bool, IResolvable] Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultAzureAccessCredentials.typescript.md b/docs/dataVaultAzureAccessCredentials.typescript.md index 078c8335..8ae6d2ab 100644 --- a/docs/dataVaultAzureAccessCredentials.typescript.md +++ b/docs/dataVaultAzureAccessCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultAzureAccessCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}. #### Initializers @@ -428,7 +428,7 @@ The construct id used in the generated config for the DataVaultAzureAccessCreden The id of the existing DataVaultAzureAccessCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#import import section} in the documentation of this resource for the id to use --- @@ -933,7 +933,7 @@ const dataVaultAzureAccessCredentialsConfig: dataVaultAzureAccessCredentials.Dat | backend | string | Azure Secret Backend to read credentials from. | | role | string | Azure Secret Role to read credentials from. | | environment | string | The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. | | maxCredValidationSeconds | number | If 'validate_creds' is true, the number of seconds after which to give up validating credentials. | | namespace | string | Target namespace. (requires Enterprise). | | numSecondsBetweenTests | number | If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. | @@ -1024,7 +1024,7 @@ public readonly backend: string; Azure Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend} --- @@ -1038,7 +1038,7 @@ public readonly role: string; Azure Secret Role to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role} --- @@ -1052,7 +1052,7 @@ public readonly environment: string; The Azure environment to use during credential validation. Defaults to the Azure Public Cloud. Some possible values: AzurePublicCloud, AzureUSGovernmentCloud. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment} --- @@ -1064,7 +1064,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1081,7 +1081,7 @@ public readonly maxCredValidationSeconds: number; If 'validate_creds' is true, the number of seconds after which to give up validating credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds} --- @@ -1095,7 +1095,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace} --- @@ -1109,7 +1109,7 @@ public readonly numSecondsBetweenTests: number; If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests} --- @@ -1123,7 +1123,7 @@ public readonly numSequentialSuccesses: number; If 'validate_creds' is true, the number of sequential successes required to validate generated credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes} --- @@ -1137,7 +1137,7 @@ public readonly subscriptionId: string; The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id} --- @@ -1151,7 +1151,7 @@ public readonly tenantId: string; The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id} --- @@ -1165,7 +1165,7 @@ public readonly validateCreds: boolean | IResolvable; Whether generated credentials should be validated before being returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds} --- diff --git a/docs/dataVaultGcpAuthBackendRole.csharp.md b/docs/dataVaultGcpAuthBackendRole.csharp.md index 2a6283eb..39717b91 100644 --- a/docs/dataVaultGcpAuthBackendRole.csharp.md +++ b/docs/dataVaultGcpAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1040,7 +1040,7 @@ new DataVaultGcpAuthBackendRoleConfig { | Provisioners | object[] | *No description.* | | RoleName | string | Name of the role. | | Backend | string | Unique name of the auth backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1134,7 +1134,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1148,7 +1148,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1160,7 +1160,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1177,7 +1177,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1191,7 +1191,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1205,7 +1205,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1219,7 +1219,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1233,7 +1233,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1247,7 +1247,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1261,7 +1261,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1275,7 +1275,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1289,7 +1289,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1303,7 +1303,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.go.md b/docs/dataVaultGcpAuthBackendRole.go.md index b4dd3711..01f319a5 100644 --- a/docs/dataVaultGcpAuthBackendRole.go.md +++ b/docs/dataVaultGcpAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1040,7 +1040,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgcpauthbacke | Provisioners | *[]interface{} | *No description.* | | RoleName | *string | Name of the role. | | Backend | *string | Unique name of the auth backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1134,7 +1134,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1148,7 +1148,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1160,7 +1160,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1177,7 +1177,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1191,7 +1191,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1205,7 +1205,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1219,7 +1219,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1233,7 +1233,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1247,7 +1247,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1261,7 +1261,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1275,7 +1275,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1289,7 +1289,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1303,7 +1303,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.java.md b/docs/dataVaultGcpAuthBackendRole.java.md index 747f1709..1efb2ff5 100644 --- a/docs/dataVaultGcpAuthBackendRole.java.md +++ b/docs/dataVaultGcpAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -53,7 +53,7 @@ DataVaultGcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -133,7 +133,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -244,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1257,7 +1257,7 @@ DataVaultGcpAuthBackendRoleConfig.builder() | provisioners | java.util.List | *No description.* | | roleName | java.lang.String | Name of the role. | | backend | java.lang.String | Unique name of the auth backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1351,7 +1351,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1365,7 +1365,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1377,7 +1377,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1408,7 +1408,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1422,7 +1422,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1436,7 +1436,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1450,7 +1450,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1464,7 +1464,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1478,7 +1478,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1492,7 +1492,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1506,7 +1506,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1520,7 +1520,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.python.md b/docs/dataVaultGcpAuthBackendRole.python.md index d2510bac..363f2819 100644 --- a/docs/dataVaultGcpAuthBackendRole.python.md +++ b/docs/dataVaultGcpAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -50,7 +50,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRole( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- @@ -694,7 +694,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1285,7 +1285,7 @@ dataVaultGcpAuthBackendRole.DataVaultGcpAuthBackendRoleConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | role_name | str | Name of the role. | | backend | str | Unique name of the auth backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1379,7 +1379,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1393,7 +1393,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1405,7 +1405,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1422,7 +1422,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1436,7 +1436,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1450,7 +1450,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1464,7 +1464,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1478,7 +1478,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1492,7 +1492,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1506,7 +1506,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1520,7 +1520,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1534,7 +1534,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1548,7 +1548,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGcpAuthBackendRole.typescript.md b/docs/dataVaultGcpAuthBackendRole.typescript.md index 288107cf..6ca00e08 100644 --- a/docs/dataVaultGcpAuthBackendRole.typescript.md +++ b/docs/dataVaultGcpAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DataVaultGcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -449,7 +449,7 @@ The construct id used in the generated config for the DataVaultGcpAuthBackendRol The id of the existing DataVaultGcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1019,7 +1019,7 @@ const dataVaultGcpAuthBackendRoleConfig: dataVaultGcpAuthBackendRole.DataVaultGc | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | roleName | string | Name of the role. | | backend | string | Unique name of the auth backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1113,7 +1113,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#role_name DataVaultGcpAuthBackendRole#role_name} --- @@ -1127,7 +1127,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#backend DataVaultGcpAuthBackendRole#backend} --- @@ -1139,7 +1139,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#id DataVaultGcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1156,7 +1156,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#namespace DataVaultGcpAuthBackendRole#namespace} --- @@ -1170,7 +1170,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_bound_cidrs DataVaultGcpAuthBackendRole#token_bound_cidrs} --- @@ -1184,7 +1184,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_explicit_max_ttl DataVaultGcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1198,7 +1198,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_max_ttl DataVaultGcpAuthBackendRole#token_max_ttl} --- @@ -1212,7 +1212,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_no_default_policy DataVaultGcpAuthBackendRole#token_no_default_policy} --- @@ -1226,7 +1226,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_num_uses DataVaultGcpAuthBackendRole#token_num_uses} --- @@ -1240,7 +1240,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_period DataVaultGcpAuthBackendRole#token_period} --- @@ -1254,7 +1254,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_policies DataVaultGcpAuthBackendRole#token_policies} --- @@ -1268,7 +1268,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_ttl DataVaultGcpAuthBackendRole#token_ttl} --- @@ -1282,7 +1282,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/gcp_auth_backend_role#token_type DataVaultGcpAuthBackendRole#token_type} --- diff --git a/docs/dataVaultGenericSecret.csharp.md b/docs/dataVaultGenericSecret.csharp.md index ed441895..bdd3f30c 100644 --- a/docs/dataVaultGenericSecret.csharp.md +++ b/docs/dataVaultGenericSecret.csharp.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -777,9 +777,9 @@ new DataVaultGenericSecretConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full path from which a secret will be read. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Version | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| Version | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | WithLeaseStartTime | object | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -864,7 +864,7 @@ public string Path { get; set; } Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -876,7 +876,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -905,7 +905,7 @@ public double Version { get; set; } - *Type:* double -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -919,7 +919,7 @@ public object WithLeaseStartTime { get; set; } If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.go.md b/docs/dataVaultGenericSecret.go.md index 13957a06..0de58e07 100644 --- a/docs/dataVaultGenericSecret.go.md +++ b/docs/dataVaultGenericSecret.go.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -777,9 +777,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultgenericsecre | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full path from which a secret will be read. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Version | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| Version | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | WithLeaseStartTime | interface{} | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -864,7 +864,7 @@ Path *string Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -876,7 +876,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -905,7 +905,7 @@ Version *f64 - *Type:* *f64 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -919,7 +919,7 @@ WithLeaseStartTime interface{} If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.java.md b/docs/dataVaultGenericSecret.java.md index 31d00113..90da15d7 100644 --- a/docs/dataVaultGenericSecret.java.md +++ b/docs/dataVaultGenericSecret.java.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -44,9 +44,9 @@ DataVaultGenericSecret.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path from which a secret will be read. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -125,7 +125,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -138,7 +138,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- @@ -507,7 +507,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -896,9 +896,9 @@ DataVaultGenericSecretConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path from which a secret will be read. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -983,7 +983,7 @@ public java.lang.String getPath(); Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -995,7 +995,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1012,7 +1012,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -1024,7 +1024,7 @@ public java.lang.Number getVersion(); - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -1038,7 +1038,7 @@ public java.lang.Object getWithLeaseStartTime(); If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.python.md b/docs/dataVaultGenericSecret.python.md index 7531444c..acd9f589 100644 --- a/docs/dataVaultGenericSecret.python.md +++ b/docs/dataVaultGenericSecret.python.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -41,9 +41,9 @@ dataVaultGenericSecret.DataVaultGenericSecret( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path from which a secret will be read. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | with_lease_start_time | typing.Union[bool, cdktf.IResolvable] | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- @@ -540,7 +540,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -924,9 +924,9 @@ dataVaultGenericSecret.DataVaultGenericSecretConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path from which a secret will be read. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | with_lease_start_time | typing.Union[bool, cdktf.IResolvable] | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -1011,7 +1011,7 @@ path: str Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -1023,7 +1023,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1040,7 +1040,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -1052,7 +1052,7 @@ version: typing.Union[int, float] - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -1066,7 +1066,7 @@ with_lease_start_time: typing.Union[bool, IResolvable] If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultGenericSecret.typescript.md b/docs/dataVaultGenericSecret.typescript.md index 0795df05..ada7d744 100644 --- a/docs/dataVaultGenericSecret.typescript.md +++ b/docs/dataVaultGenericSecret.typescript.md @@ -4,7 +4,7 @@ ### DataVaultGenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret vault_generic_secret}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultGenericSecret to The id of the existing DataVaultGenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -764,9 +764,9 @@ const dataVaultGenericSecretConfig: dataVaultGenericSecret.DataVaultGenericSecre | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full path from which a secret will be read. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| version | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | +| version | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. | | withLeaseStartTime | boolean \| cdktf.IResolvable | If set to true, stores 'lease_start_time' in the TF state. | --- @@ -851,7 +851,7 @@ public readonly path: string; Full path from which a secret will be read. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#path DataVaultGenericSecret#path} --- @@ -863,7 +863,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#id DataVaultGenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#namespace DataVaultGenericSecret#namespace} --- @@ -892,7 +892,7 @@ public readonly version: number; - *Type:* number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#version DataVaultGenericSecret#version}. --- @@ -906,7 +906,7 @@ public readonly withLeaseStartTime: boolean | IResolvable; If set to true, stores 'lease_start_time' in the TF state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/generic_secret#with_lease_start_time DataVaultGenericSecret#with_lease_start_time} --- diff --git a/docs/dataVaultIdentityEntity.csharp.md b/docs/dataVaultIdentityEntity.csharp.md index d8258522..9f5416e2 100644 --- a/docs/dataVaultIdentityEntity.csharp.md +++ b/docs/dataVaultIdentityEntity.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -927,7 +927,7 @@ new DataVaultIdentityEntityConfig { | AliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | EntityId | string | ID of the entity. | | EntityName | string | Name of the entity. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -1012,7 +1012,7 @@ public string AliasId { get; set; } ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1026,7 +1026,7 @@ public string AliasMountAccessor { get; set; } Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1040,7 +1040,7 @@ public string AliasName { get; set; } Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1054,7 +1054,7 @@ public string EntityId { get; set; } ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1068,7 +1068,7 @@ public string EntityName { get; set; } Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1080,7 +1080,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.go.md b/docs/dataVaultIdentityEntity.go.md index f6d2f251..b8ca3443 100644 --- a/docs/dataVaultIdentityEntity.go.md +++ b/docs/dataVaultIdentityEntity.go.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -927,7 +927,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityenti | AliasName | *string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | EntityId | *string | ID of the entity. | | EntityName | *string | Name of the entity. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -1012,7 +1012,7 @@ AliasId *string ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1026,7 +1026,7 @@ AliasMountAccessor *string Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1040,7 +1040,7 @@ AliasName *string Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1054,7 +1054,7 @@ EntityId *string ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1068,7 +1068,7 @@ EntityName *string Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1080,7 +1080,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.java.md b/docs/dataVaultIdentityEntity.java.md index a6c1653b..3e262489 100644 --- a/docs/dataVaultIdentityEntity.java.md +++ b/docs/dataVaultIdentityEntity.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -49,7 +49,7 @@ DataVaultIdentityEntity.Builder.create(Construct scope, java.lang.String id) | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | java.lang.String | ID of the entity. | | entityName | java.lang.String | Name of the entity. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- @@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1069,7 +1069,7 @@ DataVaultIdentityEntityConfig.builder() | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | java.lang.String | ID of the entity. | | entityName | java.lang.String | Name of the entity. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1154,7 +1154,7 @@ public java.lang.String getAliasId(); ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1168,7 +1168,7 @@ public java.lang.String getAliasMountAccessor(); Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1182,7 +1182,7 @@ public java.lang.String getAliasName(); Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1196,7 +1196,7 @@ public java.lang.String getEntityId(); ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1210,7 +1210,7 @@ public java.lang.String getEntityName(); Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1222,7 +1222,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1239,7 +1239,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.python.md b/docs/dataVaultIdentityEntity.python.md index d6e74649..35e65276 100644 --- a/docs/dataVaultIdentityEntity.python.md +++ b/docs/dataVaultIdentityEntity.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -47,7 +47,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntity( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entity_id | str | ID of the entity. | | entity_name | str | Name of the entity. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- @@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1098,7 +1098,7 @@ dataVaultIdentityEntity.DataVaultIdentityEntityConfig( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entity_id | str | ID of the entity. | | entity_name | str | Name of the entity. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1183,7 +1183,7 @@ alias_id: str ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1197,7 +1197,7 @@ alias_mount_accessor: str Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1211,7 +1211,7 @@ alias_name: str Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1225,7 +1225,7 @@ entity_id: str ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1239,7 +1239,7 @@ entity_name: str Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1251,7 +1251,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1268,7 +1268,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityEntity.typescript.md b/docs/dataVaultIdentityEntity.typescript.md index c7c0a728..dcdb1015 100644 --- a/docs/dataVaultIdentityEntity.typescript.md +++ b/docs/dataVaultIdentityEntity.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity vault_identity_entity}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityEntity to The id of the existing DataVaultIdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -910,7 +910,7 @@ const dataVaultIdentityEntityConfig: dataVaultIdentityEntity.DataVaultIdentityEn | aliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | entityId | string | ID of the entity. | | entityName | string | Name of the entity. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -995,7 +995,7 @@ public readonly aliasId: string; ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_id DataVaultIdentityEntity#alias_id} --- @@ -1009,7 +1009,7 @@ public readonly aliasMountAccessor: string; Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_mount_accessor DataVaultIdentityEntity#alias_mount_accessor} --- @@ -1023,7 +1023,7 @@ public readonly aliasName: string; Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#alias_name DataVaultIdentityEntity#alias_name} --- @@ -1037,7 +1037,7 @@ public readonly entityId: string; ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_id DataVaultIdentityEntity#entity_id} --- @@ -1051,7 +1051,7 @@ public readonly entityName: string; Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#entity_name DataVaultIdentityEntity#entity_name} --- @@ -1063,7 +1063,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#id DataVaultIdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1080,7 +1080,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_entity#namespace DataVaultIdentityEntity#namespace} --- diff --git a/docs/dataVaultIdentityGroup.csharp.md b/docs/dataVaultIdentityGroup.csharp.md index 62150728..f9b2503f 100644 --- a/docs/dataVaultIdentityGroup.csharp.md +++ b/docs/dataVaultIdentityGroup.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new DataVaultIdentityGroupConfig { | AliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | GroupId | string | ID of the group. | | GroupName | string | Name of the group. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ public string AliasId { get; set; } ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1079,7 +1079,7 @@ public string AliasMountAccessor { get; set; } Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1093,7 +1093,7 @@ public string AliasName { get; set; } Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1107,7 +1107,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1121,7 +1121,7 @@ public string GroupName { get; set; } Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1133,7 +1133,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1150,7 +1150,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.go.md b/docs/dataVaultIdentityGroup.go.md index 1226374d..68fc4a93 100644 --- a/docs/dataVaultIdentityGroup.go.md +++ b/docs/dataVaultIdentityGroup.go.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentitygrou | AliasName | *string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | GroupId | *string | ID of the group. | | GroupName | *string | Name of the group. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ AliasId *string ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1079,7 +1079,7 @@ AliasMountAccessor *string Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1093,7 +1093,7 @@ AliasName *string Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1107,7 +1107,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1121,7 +1121,7 @@ GroupName *string Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1133,7 +1133,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1150,7 +1150,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.java.md b/docs/dataVaultIdentityGroup.java.md index b89089d4..8e863fc7 100644 --- a/docs/dataVaultIdentityGroup.java.md +++ b/docs/dataVaultIdentityGroup.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -49,7 +49,7 @@ DataVaultIdentityGroup.Builder.create(Construct scope, java.lang.String id) | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | java.lang.String | ID of the group. | | groupName | java.lang.String | Name of the group. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- @@ -553,7 +553,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1123,7 +1123,7 @@ DataVaultIdentityGroupConfig.builder() | aliasName | java.lang.String | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | java.lang.String | ID of the group. | | groupName | java.lang.String | Name of the group. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1208,7 +1208,7 @@ public java.lang.String getAliasId(); ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1222,7 +1222,7 @@ public java.lang.String getAliasMountAccessor(); Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1236,7 +1236,7 @@ public java.lang.String getAliasName(); Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1250,7 +1250,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1264,7 +1264,7 @@ public java.lang.String getGroupName(); Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1276,7 +1276,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1293,7 +1293,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.python.md b/docs/dataVaultIdentityGroup.python.md index 39db4841..67451418 100644 --- a/docs/dataVaultIdentityGroup.python.md +++ b/docs/dataVaultIdentityGroup.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -47,7 +47,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroup( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | group_id | str | ID of the group. | | group_name | str | Name of the group. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- @@ -587,7 +587,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1153,7 +1153,7 @@ dataVaultIdentityGroup.DataVaultIdentityGroupConfig( | alias_name | str | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | group_id | str | ID of the group. | | group_name | str | Name of the group. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1238,7 +1238,7 @@ alias_id: str ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1252,7 +1252,7 @@ alias_mount_accessor: str Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1266,7 +1266,7 @@ alias_name: str Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1280,7 +1280,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1294,7 +1294,7 @@ group_name: str Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1306,7 +1306,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1323,7 +1323,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityGroup.typescript.md b/docs/dataVaultIdentityGroup.typescript.md index b29dde65..967548a0 100644 --- a/docs/dataVaultIdentityGroup.typescript.md +++ b/docs/dataVaultIdentityGroup.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group vault_identity_group}. #### Initializers @@ -414,7 +414,7 @@ The construct id used in the generated config for the DataVaultIdentityGroup to The id of the existing DataVaultIdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -965,7 +965,7 @@ const dataVaultIdentityGroupConfig: dataVaultIdentityGroup.DataVaultIdentityGrou | aliasName | string | Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. | | groupId | string | ID of the group. | | groupName | string | Name of the group. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -1050,7 +1050,7 @@ public readonly aliasId: string; ID of the alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_id DataVaultIdentityGroup#alias_id} --- @@ -1064,7 +1064,7 @@ public readonly aliasMountAccessor: string; Accessor of the mount to which the alias belongs to. This should be supplied in conjunction with `alias_name`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_mount_accessor DataVaultIdentityGroup#alias_mount_accessor} --- @@ -1078,7 +1078,7 @@ public readonly aliasName: string; Name of the alias. This should be supplied in conjunction with `alias_mount_accessor`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#alias_name DataVaultIdentityGroup#alias_name} --- @@ -1092,7 +1092,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_id DataVaultIdentityGroup#group_id} --- @@ -1106,7 +1106,7 @@ public readonly groupName: string; Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#group_name DataVaultIdentityGroup#group_name} --- @@ -1118,7 +1118,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#id DataVaultIdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_group#namespace DataVaultIdentityGroup#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.csharp.md b/docs/dataVaultIdentityOidcClientCreds.csharp.md index 4a4cbdb4..39cb5533 100644 --- a/docs/dataVaultIdentityOidcClientCreds.csharp.md +++ b/docs/dataVaultIdentityOidcClientCreds.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ new DataVaultIdentityOidcClientCredsConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the client. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public string Name { get; set; } The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -770,7 +770,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.go.md b/docs/dataVaultIdentityOidcClientCreds.go.md index 31db0394..b557b227 100644 --- a/docs/dataVaultIdentityOidcClientCreds.go.md +++ b/docs/dataVaultIdentityOidcClientCreds.go.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the client. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ Name *string The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -770,7 +770,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.java.md b/docs/dataVaultIdentityOidcClientCreds.java.md index ec02eb1d..aee03dae 100644 --- a/docs/dataVaultIdentityOidcClientCreds.java.md +++ b/docs/dataVaultIdentityOidcClientCreds.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcClientCreds.Builder.create(Construct scope, java.lang.Strin | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the client. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -768,7 +768,7 @@ DataVaultIdentityOidcClientCredsConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the client. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -853,7 +853,7 @@ public java.lang.String getName(); The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -865,7 +865,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -882,7 +882,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.python.md b/docs/dataVaultIdentityOidcClientCreds.python.md index f89e494b..9df18c6b 100644 --- a/docs/dataVaultIdentityOidcClientCreds.python.md +++ b/docs/dataVaultIdentityOidcClientCreds.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCreds( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the client. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ dataVaultIdentityOidcClientCreds.DataVaultIdentityOidcClientCredsConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the client. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -883,7 +883,7 @@ name: str The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -895,7 +895,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -912,7 +912,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcClientCreds.typescript.md b/docs/dataVaultIdentityOidcClientCreds.typescript.md index b9ccd716..87c989ad 100644 --- a/docs/dataVaultIdentityOidcClientCreds.typescript.md +++ b/docs/dataVaultIdentityOidcClientCreds.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcClientCreds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds vault_identity_oidc_client_creds}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcClien The id of the existing DataVaultIdentityOidcClientCreds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ const dataVaultIdentityOidcClientCredsConfig: dataVaultIdentityOidcClientCreds.D | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the client. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public readonly name: string; The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#name DataVaultIdentityOidcClientCreds#name} --- @@ -759,7 +759,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#id DataVaultIdentityOidcClientCreds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_client_creds#namespace DataVaultIdentityOidcClientCreds#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md index 6ee5a2f0..796846fd 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.csharp.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -783,7 +783,7 @@ new DataVaultIdentityOidcOpenidConfigConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the provider. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -868,7 +868,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -880,7 +880,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.go.md b/docs/dataVaultIdentityOidcOpenidConfig.go.md index b6a79b8c..280e4056 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.go.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.go.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -783,7 +783,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the provider. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -868,7 +868,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -880,7 +880,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.java.md b/docs/dataVaultIdentityOidcOpenidConfig.java.md index 7ec63577..6f92b696 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.java.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcOpenidConfig.Builder.create(Construct scope, java.lang.Stri | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ DataVaultIdentityOidcOpenidConfigConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -963,7 +963,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -975,7 +975,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -992,7 +992,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.python.md b/docs/dataVaultIdentityOidcOpenidConfig.python.md index a885af05..ea553ef4 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.python.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ dataVaultIdentityOidcOpenidConfig.DataVaultIdentityOidcOpenidConfigConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -1005,7 +1005,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1022,7 +1022,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md index d5547b02..d7062843 100644 --- a/docs/dataVaultIdentityOidcOpenidConfig.typescript.md +++ b/docs/dataVaultIdentityOidcOpenidConfig.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcOpenidConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config vault_identity_oidc_openid_config}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcOpeni The id of the existing DataVaultIdentityOidcOpenidConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#import import section} in the documentation of this resource for the id to use --- @@ -772,7 +772,7 @@ const dataVaultIdentityOidcOpenidConfigConfig: dataVaultIdentityOidcOpenidConfig | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the provider. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -857,7 +857,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#name DataVaultIdentityOidcOpenidConfig#name} --- @@ -869,7 +869,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#id DataVaultIdentityOidcOpenidConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -886,7 +886,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_openid_config#namespace DataVaultIdentityOidcOpenidConfig#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.csharp.md b/docs/dataVaultIdentityOidcPublicKeys.csharp.md index 81510a85..7687273f 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.csharp.md +++ b/docs/dataVaultIdentityOidcPublicKeys.csharp.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ new DataVaultIdentityOidcPublicKeysConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Name | string | The name of the provider. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -759,7 +759,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.go.md b/docs/dataVaultIdentityOidcPublicKeys.go.md index af22f60c..09d89642 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.go.md +++ b/docs/dataVaultIdentityOidcPublicKeys.go.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultidentityoidc | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the provider. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -759,7 +759,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.java.md b/docs/dataVaultIdentityOidcPublicKeys.java.md index 71d15554..3b20df9a 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.java.md +++ b/docs/dataVaultIdentityOidcPublicKeys.java.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -41,7 +41,7 @@ DataVaultIdentityOidcPublicKeys.Builder.create(Construct scope, java.lang.String | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -757,7 +757,7 @@ DataVaultIdentityOidcPublicKeysConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the provider. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -842,7 +842,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -854,7 +854,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -871,7 +871,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.python.md b/docs/dataVaultIdentityOidcPublicKeys.python.md index 5746ecc3..33b0e638 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.python.md +++ b/docs/dataVaultIdentityOidcPublicKeys.python.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -39,7 +39,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeys( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ dataVaultIdentityOidcPublicKeys.DataVaultIdentityOidcPublicKeysConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the provider. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -884,7 +884,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -901,7 +901,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultIdentityOidcPublicKeys.typescript.md b/docs/dataVaultIdentityOidcPublicKeys.typescript.md index f7a6ad12..7672afc1 100644 --- a/docs/dataVaultIdentityOidcPublicKeys.typescript.md +++ b/docs/dataVaultIdentityOidcPublicKeys.typescript.md @@ -4,7 +4,7 @@ ### DataVaultIdentityOidcPublicKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys vault_identity_oidc_public_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultIdentityOidcPubli The id of the existing DataVaultIdentityOidcPublicKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#import import section} in the documentation of this resource for the id to use --- @@ -651,7 +651,7 @@ const dataVaultIdentityOidcPublicKeysConfig: dataVaultIdentityOidcPublicKeys.Dat | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the provider. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -736,7 +736,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#name DataVaultIdentityOidcPublicKeys#name} --- @@ -748,7 +748,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#id DataVaultIdentityOidcPublicKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -765,7 +765,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/identity_oidc_public_keys#namespace DataVaultIdentityOidcPublicKeys#namespace} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md index 5e165faa..1a3d78ad 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | ResetKubernetesHost | *No description.* | | ResetNamespace | *No description.* | | ResetPemKeys | *No description.* | +| ResetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -325,6 +326,12 @@ private void ResetNamespace() private void ResetPemKeys() ``` +##### `ResetUseAnnotationsAsAliasMetadata` + +```csharp +private void ResetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | KubernetesHostInput | string | *No description.* | | NamespaceInput | string | *No description.* | | PemKeysInput | string[] | *No description.* | +| UseAnnotationsAsAliasMetadataInput | object | *No description.* | | Backend | string | *No description.* | | DisableIssValidation | object | *No description.* | | DisableLocalCaJwt | object | *No description.* | @@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | KubernetesHost | string | *No description.* | | Namespace | string | *No description.* | | PemKeys | string[] | *No description.* | +| UseAnnotationsAsAliasMetadata | object | *No description.* | --- @@ -689,6 +698,16 @@ public string[] PemKeysInput { get; } --- +##### `UseAnnotationsAsAliasMetadataInput`Optional + +```csharp +public object UseAnnotationsAsAliasMetadataInput { get; } +``` + +- *Type:* object + +--- + ##### `Backend`Required ```csharp @@ -779,6 +798,16 @@ public string[] PemKeys { get; } --- +##### `UseAnnotationsAsAliasMetadata`Required + +```csharp +public object UseAnnotationsAsAliasMetadata { get; } +``` + +- *Type:* object + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -822,7 +851,8 @@ new DataVaultKubernetesAuthBackendConfigConfig { string KubernetesCaCert = null, string KubernetesHost = null, string Namespace = null, - string[] PemKeys = null + string[] PemKeys = null, + object UseAnnotationsAsAliasMetadata = null }; ``` @@ -840,12 +870,13 @@ new DataVaultKubernetesAuthBackendConfigConfig { | Backend | string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | object | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | object | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | Issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | KubernetesHost | string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | Namespace | string | Target namespace. (requires Enterprise). | | PemKeys | string[] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| UseAnnotationsAsAliasMetadata | object | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -929,7 +960,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -943,7 +974,7 @@ public object DisableIssValidation { get; set; } Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -957,7 +988,7 @@ public object DisableLocalCaJwt { get; set; } Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -969,7 +1000,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -986,7 +1017,7 @@ public string Issuer { get; set; } Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1000,7 +1031,7 @@ public string KubernetesCaCert { get; set; } PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1014,7 +1045,7 @@ public string KubernetesHost { get; set; } Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1028,7 +1059,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1044,7 +1075,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `UseAnnotationsAsAliasMetadata`Optional + +```csharp +public object UseAnnotationsAsAliasMetadata { get; set; } +``` + +- *Type:* object + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.go.md b/docs/dataVaultKubernetesAuthBackendConfig.go.md index f5ba596d..fac17870 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.go.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.go.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | ResetKubernetesHost | *No description.* | | ResetNamespace | *No description.* | | ResetPemKeys | *No description.* | +| ResetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -325,6 +326,12 @@ func ResetNamespace() func ResetPemKeys() ``` +##### `ResetUseAnnotationsAsAliasMetadata` + +```go +func ResetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | KubernetesHostInput | *string | *No description.* | | NamespaceInput | *string | *No description.* | | PemKeysInput | *[]*string | *No description.* | +| UseAnnotationsAsAliasMetadataInput | interface{} | *No description.* | | Backend | *string | *No description.* | | DisableIssValidation | interface{} | *No description.* | | DisableLocalCaJwt | interface{} | *No description.* | @@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | KubernetesHost | *string | *No description.* | | Namespace | *string | *No description.* | | PemKeys | *[]*string | *No description.* | +| UseAnnotationsAsAliasMetadata | interface{} | *No description.* | --- @@ -689,6 +698,16 @@ func PemKeysInput() *[]*string --- +##### `UseAnnotationsAsAliasMetadataInput`Optional + +```go +func UseAnnotationsAsAliasMetadataInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Backend`Required ```go @@ -779,6 +798,16 @@ func PemKeys() *[]*string --- +##### `UseAnnotationsAsAliasMetadata`Required + +```go +func UseAnnotationsAsAliasMetadata() interface{} +``` + +- *Type:* interface{} + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -823,6 +852,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau KubernetesHost: *string, Namespace: *string, PemKeys: *[]*string, + UseAnnotationsAsAliasMetadata: interface{}, } ``` @@ -840,12 +870,13 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau | Backend | *string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | interface{} | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | interface{} | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | Issuer | *string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | *string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | KubernetesHost | *string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | Namespace | *string | Target namespace. (requires Enterprise). | | PemKeys | *[]*string | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| UseAnnotationsAsAliasMetadata | interface{} | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -929,7 +960,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -943,7 +974,7 @@ DisableIssValidation interface{} Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -957,7 +988,7 @@ DisableLocalCaJwt interface{} Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -969,7 +1000,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -986,7 +1017,7 @@ Issuer *string Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1000,7 +1031,7 @@ KubernetesCaCert *string PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1014,7 +1045,7 @@ KubernetesHost *string Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1028,7 +1059,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1044,7 +1075,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `UseAnnotationsAsAliasMetadata`Optional + +```go +UseAnnotationsAsAliasMetadata interface{} +``` + +- *Type:* interface{} + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.java.md b/docs/dataVaultKubernetesAuthBackendConfig.java.md index 65919dbc..fb9a3e05 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.java.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -34,6 +34,8 @@ DataVaultKubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.S // .kubernetesHost(java.lang.String) // .namespace(java.lang.String) // .pemKeys(java.util.List) +// .useAnnotationsAsAliasMetadata(java.lang.Boolean) +// .useAnnotationsAsAliasMetadata(IResolvable) .build(); ``` @@ -51,12 +53,13 @@ DataVaultKubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.S | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | java.lang.String | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pemKeys | java.util.List | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -126,7 +129,7 @@ Must be unique amongst siblings in the same scope Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -136,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -146,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -154,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +170,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -177,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -187,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -197,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -209,7 +212,17 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- @@ -243,6 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetKubernetesHost | *No description.* | | resetNamespace | *No description.* | | resetPemKeys | *No description.* | +| resetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -492,6 +506,12 @@ public void resetNamespace() public void resetPemKeys() ``` +##### `resetUseAnnotationsAsAliasMetadata` + +```java +public void resetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -595,7 +615,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -632,6 +652,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetesHostInput | java.lang.String | *No description.* | | namespaceInput | java.lang.String | *No description.* | | pemKeysInput | java.util.List | *No description.* | +| useAnnotationsAsAliasMetadataInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | backend | java.lang.String | *No description.* | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -641,6 +662,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetesHost | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | | pemKeys | java.util.List | *No description.* | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | --- @@ -856,6 +878,16 @@ public java.util.List getPemKeysInput(); --- +##### `useAnnotationsAsAliasMetadataInput`Optional + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadataInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `backend`Required ```java @@ -946,6 +978,16 @@ public java.util.List getPemKeys(); --- +##### `useAnnotationsAsAliasMetadata`Required + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadata(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -996,6 +1038,8 @@ DataVaultKubernetesAuthBackendConfigConfig.builder() // .kubernetesHost(java.lang.String) // .namespace(java.lang.String) // .pemKeys(java.util.List) +// .useAnnotationsAsAliasMetadata(java.lang.Boolean) +// .useAnnotationsAsAliasMetadata(IResolvable) .build(); ``` @@ -1013,12 +1057,13 @@ DataVaultKubernetesAuthBackendConfigConfig.builder() | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | java.lang.String | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pemKeys | java.util.List | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1102,7 +1147,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -1116,7 +1161,7 @@ public java.lang.Object getDisableIssValidation(); Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1130,7 +1175,7 @@ public java.lang.Object getDisableLocalCaJwt(); Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1142,7 +1187,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1159,7 +1204,7 @@ public java.lang.String getIssuer(); Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1173,7 +1218,7 @@ public java.lang.String getKubernetesCaCert(); PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1187,7 +1232,7 @@ public java.lang.String getKubernetesHost(); Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1201,7 +1246,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1217,7 +1262,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadata(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.python.md b/docs/dataVaultKubernetesAuthBackendConfig.python.md index 499e9fa1..e978594f 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.python.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -29,7 +29,8 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfig( kubernetes_ca_cert: str = None, kubernetes_host: str = None, namespace: str = None, - pem_keys: typing.List[str] = None + pem_keys: typing.List[str] = None, + use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None ) ``` @@ -47,12 +48,13 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetes_host | str | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | namespace | str | Target namespace. (requires Enterprise). | | pem_keys | typing.List[str] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -122,7 +124,7 @@ Must be unique amongst siblings in the same scope Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -132,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -142,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -150,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +165,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -173,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -183,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -193,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -205,7 +207,17 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `use_annotations_as_alias_metadata`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- @@ -239,6 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_kubernetes_host | *No description.* | | reset_namespace | *No description.* | | reset_pem_keys | *No description.* | +| reset_use_annotations_as_alias_metadata | *No description.* | --- @@ -513,6 +526,12 @@ def reset_namespace() -> None def reset_pem_keys() -> None ``` +##### `reset_use_annotations_as_alias_metadata` + +```python +def reset_use_annotations_as_alias_metadata() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -627,7 +646,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -664,6 +683,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetes_host_input | str | *No description.* | | namespace_input | str | *No description.* | | pem_keys_input | typing.List[str] | *No description.* | +| use_annotations_as_alias_metadata_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | backend | str | *No description.* | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | *No description.* | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -673,6 +693,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetes_host | str | *No description.* | | namespace | str | *No description.* | | pem_keys | typing.List[str] | *No description.* | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | *No description.* | --- @@ -888,6 +909,16 @@ pem_keys_input: typing.List[str] --- +##### `use_annotations_as_alias_metadata_input`Optional + +```python +use_annotations_as_alias_metadata_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `backend`Required ```python @@ -978,6 +1009,16 @@ pem_keys: typing.List[str] --- +##### `use_annotations_as_alias_metadata`Required + +```python +use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1021,7 +1062,8 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfigConfig( kubernetes_ca_cert: str = None, kubernetes_host: str = None, namespace: str = None, - pem_keys: typing.List[str] = None + pem_keys: typing.List[str] = None, + use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None ) ``` @@ -1039,12 +1081,13 @@ dataVaultKubernetesAuthBackendConfig.DataVaultKubernetesAuthBackendConfigConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetes_host | str | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | namespace | str | Target namespace. (requires Enterprise). | | pem_keys | typing.List[str] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1128,7 +1171,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -1142,7 +1185,7 @@ disable_iss_validation: typing.Union[bool, IResolvable] Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1156,7 +1199,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1168,7 +1211,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1185,7 +1228,7 @@ issuer: str Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -1199,7 +1242,7 @@ kubernetes_ca_cert: str PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1213,7 +1256,7 @@ kubernetes_host: str Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1227,7 +1270,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1243,7 +1286,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `use_annotations_as_alias_metadata`Optional + +```python +use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md index 01af95dd..3bf26796 100644 --- a/docs/dataVaultKubernetesAuthBackendConfig.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | resetKubernetesHost | *No description.* | | resetNamespace | *No description.* | | resetPemKeys | *No description.* | +| resetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -325,6 +326,12 @@ public resetNamespace(): void public resetPemKeys(): void ``` +##### `resetUseAnnotationsAsAliasMetadata` + +```typescript +public resetUseAnnotationsAsAliasMetadata(): void +``` + #### Static Functions | **Name** | **Description** | @@ -428,7 +435,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -465,6 +472,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetesHostInput | string | *No description.* | | namespaceInput | string | *No description.* | | pemKeysInput | string[] | *No description.* | +| useAnnotationsAsAliasMetadataInput | boolean \| cdktf.IResolvable | *No description.* | | backend | string | *No description.* | | disableIssValidation | boolean \| cdktf.IResolvable | *No description.* | | disableLocalCaJwt | boolean \| cdktf.IResolvable | *No description.* | @@ -474,6 +482,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | kubernetesHost | string | *No description.* | | namespace | string | *No description.* | | pemKeys | string[] | *No description.* | +| useAnnotationsAsAliasMetadata | boolean \| cdktf.IResolvable | *No description.* | --- @@ -689,6 +698,16 @@ public readonly pemKeysInput: string[]; --- +##### `useAnnotationsAsAliasMetadataInput`Optional + +```typescript +public readonly useAnnotationsAsAliasMetadataInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `backend`Required ```typescript @@ -779,6 +798,16 @@ public readonly pemKeys: string[]; --- +##### `useAnnotationsAsAliasMetadata`Required + +```typescript +public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -823,12 +852,13 @@ const dataVaultKubernetesAuthBackendConfigConfig: dataVaultKubernetesAuthBackend | backend | string | Unique name of the kubernetes backend to configure. | | disableIssValidation | boolean \| cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. | | issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | kubernetesHost | string | Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. | | namespace | string | Target namespace. (requires Enterprise). | | pemKeys | string[] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | +| useAnnotationsAsAliasMetadata | boolean \| cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -912,7 +942,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#backend DataVaultKubernetesAuthBackendConfig#backend} --- @@ -926,7 +956,7 @@ public readonly disableIssValidation: boolean | IResolvable; Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_iss_validation DataVaultKubernetesAuthBackendConfig#disable_iss_validation} --- @@ -940,7 +970,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#disable_local_ca_jwt DataVaultKubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -952,7 +982,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#id DataVaultKubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -969,7 +999,7 @@ public readonly issuer: string; Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#issuer DataVaultKubernetesAuthBackendConfig#issuer} --- @@ -983,7 +1013,7 @@ public readonly kubernetesCaCert: string; PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_ca_cert DataVaultKubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -997,7 +1027,7 @@ public readonly kubernetesHost: string; Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#kubernetes_host DataVaultKubernetesAuthBackendConfig#kubernetes_host} --- @@ -1011,7 +1041,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#namespace DataVaultKubernetesAuthBackendConfig#namespace} --- @@ -1027,7 +1057,21 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#pem_keys DataVaultKubernetesAuthBackendConfig#pem_keys} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +```typescript +public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata DataVaultKubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.csharp.md b/docs/dataVaultKubernetesAuthBackendRole.csharp.md index cc92c68a..b5b025a2 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.csharp.md +++ b/docs/dataVaultKubernetesAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1016,7 +1016,7 @@ new DataVaultKubernetesAuthBackendRoleConfig { | RoleName | string | Name of the role. | | Audience | string | Optional Audience claim to verify in the JWT. | | Backend | string | Unique name of the kubernetes backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1110,7 +1110,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1124,7 +1124,7 @@ public string Audience { get; set; } Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1138,7 +1138,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1150,7 +1150,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1167,7 +1167,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1181,7 +1181,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1195,7 +1195,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1209,7 +1209,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1223,7 +1223,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1237,7 +1237,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1251,7 +1251,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1265,7 +1265,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1279,7 +1279,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1293,7 +1293,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.go.md b/docs/dataVaultKubernetesAuthBackendRole.go.md index 01e5a6f2..04ffedce 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.go.md +++ b/docs/dataVaultKubernetesAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1016,7 +1016,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesau | RoleName | *string | Name of the role. | | Audience | *string | Optional Audience claim to verify in the JWT. | | Backend | *string | Unique name of the kubernetes backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1110,7 +1110,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1124,7 +1124,7 @@ Audience *string Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1138,7 +1138,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1150,7 +1150,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1167,7 +1167,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1181,7 +1181,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1195,7 +1195,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1209,7 +1209,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1223,7 +1223,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1237,7 +1237,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1251,7 +1251,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1265,7 +1265,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1279,7 +1279,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1293,7 +1293,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.java.md b/docs/dataVaultKubernetesAuthBackendRole.java.md index 6c9b6d3b..dd9f4774 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.java.md +++ b/docs/dataVaultKubernetesAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -55,7 +55,7 @@ DataVaultKubernetesAuthBackendRole.Builder.create(Construct scope, java.lang.Str | roleName | java.lang.String | Name of the role. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- @@ -680,7 +680,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1245,7 +1245,7 @@ DataVaultKubernetesAuthBackendRoleConfig.builder() | roleName | java.lang.String | Name of the role. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1339,7 +1339,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1353,7 +1353,7 @@ public java.lang.String getAudience(); Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1367,7 +1367,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1379,7 +1379,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1396,7 +1396,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1410,7 +1410,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1424,7 +1424,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1438,7 +1438,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1452,7 +1452,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1466,7 +1466,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1480,7 +1480,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1494,7 +1494,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1508,7 +1508,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1522,7 +1522,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.python.md b/docs/dataVaultKubernetesAuthBackendRole.python.md index 5a43144a..d7f53b32 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.python.md +++ b/docs/dataVaultKubernetesAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -52,7 +52,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRole( | role_name | str | Name of the role. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- @@ -713,7 +713,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1273,7 +1273,7 @@ dataVaultKubernetesAuthBackendRole.DataVaultKubernetesAuthBackendRoleConfig( | role_name | str | Name of the role. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1367,7 +1367,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1381,7 +1381,7 @@ audience: str Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1395,7 +1395,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1407,7 +1407,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1424,7 +1424,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1438,7 +1438,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1452,7 +1452,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1466,7 +1466,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1480,7 +1480,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1494,7 +1494,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1508,7 +1508,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1522,7 +1522,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1536,7 +1536,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1550,7 +1550,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesAuthBackendRole.typescript.md b/docs/dataVaultKubernetesAuthBackendRole.typescript.md index 6c162781..212a3f6a 100644 --- a/docs/dataVaultKubernetesAuthBackendRole.typescript.md +++ b/docs/dataVaultKubernetesAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -456,7 +456,7 @@ The construct id used in the generated config for the DataVaultKubernetesAuthBac The id of the existing DataVaultKubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -994,7 +994,7 @@ const dataVaultKubernetesAuthBackendRoleConfig: dataVaultKubernetesAuthBackendRo | roleName | string | Name of the role. | | audience | string | Optional Audience claim to verify in the JWT. | | backend | string | Unique name of the kubernetes backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1088,7 +1088,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#role_name DataVaultKubernetesAuthBackendRole#role_name} --- @@ -1102,7 +1102,7 @@ public readonly audience: string; Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#audience DataVaultKubernetesAuthBackendRole#audience} --- @@ -1116,7 +1116,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#backend DataVaultKubernetesAuthBackendRole#backend} --- @@ -1128,7 +1128,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#id DataVaultKubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1145,7 +1145,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#namespace DataVaultKubernetesAuthBackendRole#namespace} --- @@ -1159,7 +1159,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_bound_cidrs DataVaultKubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1173,7 +1173,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_explicit_max_ttl DataVaultKubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1187,7 +1187,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_max_ttl DataVaultKubernetesAuthBackendRole#token_max_ttl} --- @@ -1201,7 +1201,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_no_default_policy DataVaultKubernetesAuthBackendRole#token_no_default_policy} --- @@ -1215,7 +1215,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_num_uses DataVaultKubernetesAuthBackendRole#token_num_uses} --- @@ -1229,7 +1229,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_period DataVaultKubernetesAuthBackendRole#token_period} --- @@ -1243,7 +1243,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_policies DataVaultKubernetesAuthBackendRole#token_policies} --- @@ -1257,7 +1257,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_ttl DataVaultKubernetesAuthBackendRole#token_ttl} --- @@ -1271,7 +1271,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_auth_backend_role#token_type DataVaultKubernetesAuthBackendRole#token_type} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.csharp.md b/docs/dataVaultKubernetesServiceAccountToken.csharp.md index 56b0dc08..53a17016 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.csharp.md +++ b/docs/dataVaultKubernetesServiceAccountToken.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -826,7 +826,7 @@ new DataVaultKubernetesServiceAccountTokenConfig { | KubernetesNamespace | string | The name of the Kubernetes namespace in which to generate the credentials. | | Role | string | The name of the role. | | ClusterRoleBinding | object | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Ttl | string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -912,7 +912,7 @@ public string Backend { get; set; } The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -926,7 +926,7 @@ public string KubernetesNamespace { get; set; } The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -940,7 +940,7 @@ public string Role { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -954,7 +954,7 @@ public object ClusterRoleBinding { get; set; } If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -997,7 +997,7 @@ public string Ttl { get; set; } The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.go.md b/docs/dataVaultKubernetesServiceAccountToken.go.md index 9ffe34cb..340ab18c 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.go.md +++ b/docs/dataVaultKubernetesServiceAccountToken.go.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -826,7 +826,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkubernetesse | KubernetesNamespace | *string | The name of the Kubernetes namespace in which to generate the credentials. | | Role | *string | The name of the role. | | ClusterRoleBinding | interface{} | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Ttl | *string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -912,7 +912,7 @@ Backend *string The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -926,7 +926,7 @@ KubernetesNamespace *string The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -940,7 +940,7 @@ Role *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -954,7 +954,7 @@ ClusterRoleBinding interface{} If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -997,7 +997,7 @@ Ttl *string The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.java.md b/docs/dataVaultKubernetesServiceAccountToken.java.md index ba4f60b4..0385a41c 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.java.md +++ b/docs/dataVaultKubernetesServiceAccountToken.java.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -49,7 +49,7 @@ DataVaultKubernetesServiceAccountToken.Builder.create(Construct scope, java.lang | kubernetesNamespace | java.lang.String | The name of the Kubernetes namespace in which to generate the credentials. | | role | java.lang.String | The name of the role. | | clusterRoleBinding | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.String | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- @@ -533,7 +533,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -971,7 +971,7 @@ DataVaultKubernetesServiceAccountTokenConfig.builder() | kubernetesNamespace | java.lang.String | The name of the Kubernetes namespace in which to generate the credentials. | | role | java.lang.String | The name of the role. | | clusterRoleBinding | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | ttl | java.lang.String | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -1071,7 +1071,7 @@ public java.lang.String getKubernetesNamespace(); The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -1085,7 +1085,7 @@ public java.lang.String getRole(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -1099,7 +1099,7 @@ public java.lang.Object getClusterRoleBinding(); If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -1111,7 +1111,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1128,7 +1128,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -1142,7 +1142,7 @@ public java.lang.String getTtl(); The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.python.md b/docs/dataVaultKubernetesServiceAccountToken.python.md index ec187e57..cae1a71b 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.python.md +++ b/docs/dataVaultKubernetesServiceAccountToken.python.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -46,7 +46,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountToken( | kubernetes_namespace | str | The name of the Kubernetes namespace in which to generate the credentials. | | role | str | The name of the role. | | cluster_role_binding | typing.Union[bool, cdktf.IResolvable] | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | str | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- @@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -999,7 +999,7 @@ dataVaultKubernetesServiceAccountToken.DataVaultKubernetesServiceAccountTokenCon | kubernetes_namespace | str | The name of the Kubernetes namespace in which to generate the credentials. | | role | str | The name of the role. | | cluster_role_binding | typing.Union[bool, cdktf.IResolvable] | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | | ttl | str | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -1085,7 +1085,7 @@ backend: str The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -1099,7 +1099,7 @@ kubernetes_namespace: str The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -1113,7 +1113,7 @@ role: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -1127,7 +1127,7 @@ cluster_role_binding: typing.Union[bool, IResolvable] If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -1139,7 +1139,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1156,7 +1156,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -1170,7 +1170,7 @@ ttl: str The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKubernetesServiceAccountToken.typescript.md b/docs/dataVaultKubernetesServiceAccountToken.typescript.md index 5ed5ad24..343aab69 100644 --- a/docs/dataVaultKubernetesServiceAccountToken.typescript.md +++ b/docs/dataVaultKubernetesServiceAccountToken.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKubernetesServiceAccountToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token vault_kubernetes_service_account_token}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKubernetesService The id of the existing DataVaultKubernetesServiceAccountToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#import import section} in the documentation of this resource for the id to use --- @@ -811,7 +811,7 @@ const dataVaultKubernetesServiceAccountTokenConfig: dataVaultKubernetesServiceAc | kubernetesNamespace | string | The name of the Kubernetes namespace in which to generate the credentials. | | role | string | The name of the role. | | clusterRoleBinding | boolean \| cdktf.IResolvable | If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. | | namespace | string | Target namespace. (requires Enterprise). | | ttl | string | The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. | @@ -897,7 +897,7 @@ public readonly backend: string; The Kubernetes secret backend to generate service account tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#backend DataVaultKubernetesServiceAccountToken#backend} --- @@ -911,7 +911,7 @@ public readonly kubernetesNamespace: string; The name of the Kubernetes namespace in which to generate the credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#kubernetes_namespace DataVaultKubernetesServiceAccountToken#kubernetes_namespace} --- @@ -925,7 +925,7 @@ public readonly role: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#role DataVaultKubernetesServiceAccountToken#role} --- @@ -939,7 +939,7 @@ public readonly clusterRoleBinding: boolean | IResolvable; If true, generate a ClusterRoleBinding to grant permissions across the whole cluster instead of within a namespace. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#cluster_role_binding DataVaultKubernetesServiceAccountToken#cluster_role_binding} --- @@ -951,7 +951,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#id DataVaultKubernetesServiceAccountToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -968,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#namespace DataVaultKubernetesServiceAccountToken#namespace} --- @@ -982,7 +982,7 @@ public readonly ttl: string; The TTL of the generated Kubernetes service account token, specified in seconds or as a Go duration format string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kubernetes_service_account_token#ttl DataVaultKubernetesServiceAccountToken#ttl} --- diff --git a/docs/dataVaultKvSecret.csharp.md b/docs/dataVaultKvSecret.csharp.md index 0c8a5868..48b7f4e9 100644 --- a/docs/dataVaultKvSecret.csharp.md +++ b/docs/dataVaultKvSecret.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -706,7 +706,7 @@ new DataVaultKvSecretConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full path of the KV-V1 secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -791,7 +791,7 @@ public string Path { get; set; } Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -803,7 +803,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.go.md b/docs/dataVaultKvSecret.go.md index d64a6154..a6560146 100644 --- a/docs/dataVaultKvSecret.go.md +++ b/docs/dataVaultKvSecret.go.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -706,7 +706,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecret" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full path of the KV-V1 secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -791,7 +791,7 @@ Path *string Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -803,7 +803,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.java.md b/docs/dataVaultKvSecret.java.md index ba80ed54..199e12cd 100644 --- a/docs/dataVaultKvSecret.java.md +++ b/docs/dataVaultKvSecret.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -41,7 +41,7 @@ DataVaultKvSecret.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -801,7 +801,7 @@ DataVaultKvSecretConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -886,7 +886,7 @@ public java.lang.String getPath(); Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -898,7 +898,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.python.md b/docs/dataVaultKvSecret.python.md index 5fda237d..268bc079 100644 --- a/docs/dataVaultKvSecret.python.md +++ b/docs/dataVaultKvSecret.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -39,7 +39,7 @@ dataVaultKvSecret.DataVaultKvSecret( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -831,7 +831,7 @@ dataVaultKvSecret.DataVaultKvSecretConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -916,7 +916,7 @@ path: str Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -928,7 +928,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -945,7 +945,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecret.typescript.md b/docs/dataVaultKvSecret.typescript.md index dc86a339..c2422867 100644 --- a/docs/dataVaultKvSecret.typescript.md +++ b/docs/dataVaultKvSecret.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret vault_kv_secret}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecret to impor The id of the existing DataVaultKvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -695,7 +695,7 @@ const dataVaultKvSecretConfig: dataVaultKvSecret.DataVaultKvSecretConfig = { ... | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full path of the KV-V1 secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -780,7 +780,7 @@ public readonly path: string; Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#path DataVaultKvSecret#path} --- @@ -792,7 +792,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#id DataVaultKvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -809,7 +809,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret#namespace DataVaultKvSecret#namespace} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.csharp.md b/docs/dataVaultKvSecretSubkeysV2.csharp.md index 9ebff0b3..5835ead4 100644 --- a/docs/dataVaultKvSecretSubkeysV2.csharp.md +++ b/docs/dataVaultKvSecretSubkeysV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ new DataVaultKvSecretSubkeysV2Config { | Mount | string | Path where KV-V2 engine is mounted. | | Name | string | Full name of the secret. | | Depth | double | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Version | double | Specifies the version to return. If not set the latest version is returned. | @@ -855,7 +855,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -885,7 +885,7 @@ public double Depth { get; set; } Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -897,7 +897,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -914,7 +914,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -928,7 +928,7 @@ public double Version { get; set; } Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.go.md b/docs/dataVaultKvSecretSubkeysV2.go.md index 7a560648..0fa8dd25 100644 --- a/docs/dataVaultKvSecretSubkeysV2.go.md +++ b/docs/dataVaultKvSecretSubkeysV2.go.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretsubk | Mount | *string | Path where KV-V2 engine is mounted. | | Name | *string | Full name of the secret. | | Depth | *f64 | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Version | *f64 | Specifies the version to return. If not set the latest version is returned. | @@ -855,7 +855,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -885,7 +885,7 @@ Depth *f64 Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -897,7 +897,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -914,7 +914,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -928,7 +928,7 @@ Version *f64 Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.java.md b/docs/dataVaultKvSecretSubkeysV2.java.md index 0fe73c0d..fca4bfb7 100644 --- a/docs/dataVaultKvSecretSubkeysV2.java.md +++ b/docs/dataVaultKvSecretSubkeysV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -46,7 +46,7 @@ DataVaultKvSecretSubkeysV2.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | | depth | java.lang.Number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Specifies the version to return. If not set the latest version is returned. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -130,7 +130,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- @@ -522,7 +522,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ DataVaultKvSecretSubkeysV2Config.builder() | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | | depth | java.lang.Number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Specifies the version to return. If not set the latest version is returned. | @@ -988,7 +988,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -1004,7 +1004,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -1018,7 +1018,7 @@ public java.lang.Number getDepth(); Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -1030,7 +1030,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1047,7 +1047,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -1061,7 +1061,7 @@ public java.lang.Number getVersion(); Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.python.md b/docs/dataVaultKvSecretSubkeysV2.python.md index 0d924815..9ed80256 100644 --- a/docs/dataVaultKvSecretSubkeysV2.python.md +++ b/docs/dataVaultKvSecretSubkeysV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -44,7 +44,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2( | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | | depth | typing.Union[int, float] | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Specifies the version to return. If not set the latest version is returned. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -128,7 +128,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- @@ -556,7 +556,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -932,7 +932,7 @@ dataVaultKvSecretSubkeysV2.DataVaultKvSecretSubkeysV2Config( | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | | depth | typing.Union[int, float] | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Specifies the version to return. If not set the latest version is returned. | @@ -1018,7 +1018,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -1034,7 +1034,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -1048,7 +1048,7 @@ depth: typing.Union[int, float] Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -1060,7 +1060,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -1091,7 +1091,7 @@ version: typing.Union[int, float] Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretSubkeysV2.typescript.md b/docs/dataVaultKvSecretSubkeysV2.typescript.md index bc79e577..f6851661 100644 --- a/docs/dataVaultKvSecretSubkeysV2.typescript.md +++ b/docs/dataVaultKvSecretSubkeysV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretSubkeysV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2 vault_kv_secret_subkeys_v2}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultKvSecretSubkeysV2 The id of the existing DataVaultKvSecretSubkeysV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#import import section} in the documentation of this resource for the id to use --- @@ -755,7 +755,7 @@ const dataVaultKvSecretSubkeysV2Config: dataVaultKvSecretSubkeysV2.DataVaultKvSe | mount | string | Path where KV-V2 engine is mounted. | | name | string | Full name of the secret. | | depth | number | Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | version | number | Specifies the version to return. If not set the latest version is returned. | @@ -841,7 +841,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#mount DataVaultKvSecretSubkeysV2#mount} --- @@ -857,7 +857,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#name DataVaultKvSecretSubkeysV2#name} --- @@ -871,7 +871,7 @@ public readonly depth: number; Specifies the deepest nesting level to provide in the output.If non-zero, keys that reside at the specified depth value will be artificially treated as leaves and will thus be 'null' even if further underlying sub-keys exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#depth DataVaultKvSecretSubkeysV2#depth} --- @@ -883,7 +883,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#id DataVaultKvSecretSubkeysV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -900,7 +900,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#namespace DataVaultKvSecretSubkeysV2#namespace} --- @@ -914,7 +914,7 @@ public readonly version: number; Specifies the version to return. If not set the latest version is returned. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_subkeys_v2#version DataVaultKvSecretSubkeysV2#version} --- diff --git a/docs/dataVaultKvSecretV2.csharp.md b/docs/dataVaultKvSecretV2.csharp.md index 5e57a8c7..ef94787a 100644 --- a/docs/dataVaultKvSecretV2.csharp.md +++ b/docs/dataVaultKvSecretV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -782,7 +782,7 @@ new DataVaultKvSecretV2Config { | Provisioners | object[] | *No description.* | | Mount | string | Path where KV-V2 engine is mounted. | | Name | string | Full name of the secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Version | double | Version of the secret to retrieve. | @@ -868,7 +868,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -884,7 +884,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -896,7 +896,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -927,7 +927,7 @@ public double Version { get; set; } Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.go.md b/docs/dataVaultKvSecretV2.go.md index e5882900..b6653ffc 100644 --- a/docs/dataVaultKvSecretV2.go.md +++ b/docs/dataVaultKvSecretV2.go.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -782,7 +782,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretv2" | Provisioners | *[]interface{} | *No description.* | | Mount | *string | Path where KV-V2 engine is mounted. | | Name | *string | Full name of the secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Version | *f64 | Version of the secret to retrieve. | @@ -868,7 +868,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -884,7 +884,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -896,7 +896,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -927,7 +927,7 @@ Version *f64 Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.java.md b/docs/dataVaultKvSecretV2.java.md index 5e816791..86a42285 100644 --- a/docs/dataVaultKvSecretV2.java.md +++ b/docs/dataVaultKvSecretV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -44,7 +44,7 @@ DataVaultKvSecretV2.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Version of the secret to retrieve. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -128,7 +128,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- @@ -503,7 +503,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -903,7 +903,7 @@ DataVaultKvSecretV2Config.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | | name | java.lang.String | Full name of the secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | version | java.lang.Number | Version of the secret to retrieve. | @@ -989,7 +989,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -1005,7 +1005,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -1017,7 +1017,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -1048,7 +1048,7 @@ public java.lang.Number getVersion(); Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.python.md b/docs/dataVaultKvSecretV2.python.md index bf98c5b6..8996da1c 100644 --- a/docs/dataVaultKvSecretV2.python.md +++ b/docs/dataVaultKvSecretV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -42,7 +42,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Version of the secret to retrieve. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -126,7 +126,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- @@ -537,7 +537,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -933,7 +933,7 @@ dataVaultKvSecretV2.DataVaultKvSecretV2Config( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | | name | str | Full name of the secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | version | typing.Union[int, float] | Version of the secret to retrieve. | @@ -1019,7 +1019,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -1035,7 +1035,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -1047,7 +1047,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1064,7 +1064,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -1078,7 +1078,7 @@ version: typing.Union[int, float] Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretV2.typescript.md b/docs/dataVaultKvSecretV2.typescript.md index 56f9c08c..7a6afca3 100644 --- a/docs/dataVaultKvSecretV2.typescript.md +++ b/docs/dataVaultKvSecretV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretV2 to imp The id of the existing DataVaultKvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -769,7 +769,7 @@ const dataVaultKvSecretV2Config: dataVaultKvSecretV2.DataVaultKvSecretV2Config = | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | Path where KV-V2 engine is mounted. | | name | string | Full name of the secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | version | number | Version of the secret to retrieve. | @@ -855,7 +855,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#mount DataVaultKvSecretV2#mount} --- @@ -871,7 +871,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#name DataVaultKvSecretV2#name} --- @@ -883,7 +883,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#id DataVaultKvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -900,7 +900,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#namespace DataVaultKvSecretV2#namespace} --- @@ -914,7 +914,7 @@ public readonly version: number; Version of the secret to retrieve. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secret_v2#version DataVaultKvSecretV2#version} --- diff --git a/docs/dataVaultKvSecretsList.csharp.md b/docs/dataVaultKvSecretsList.csharp.md index 74aff140..2491fb75 100644 --- a/docs/dataVaultKvSecretsList.csharp.md +++ b/docs/dataVaultKvSecretsList.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ new DataVaultKvSecretsListConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Path | string | Full KV-V1 path where secrets will be listed. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ public string Path { get; set; } Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -759,7 +759,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.go.md b/docs/dataVaultKvSecretsList.go.md index c60ba195..3969357e 100644 --- a/docs/dataVaultKvSecretsList.go.md +++ b/docs/dataVaultKvSecretsList.go.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -662,7 +662,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslis | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Path | *string | Full KV-V1 path where secrets will be listed. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -747,7 +747,7 @@ Path *string Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -759,7 +759,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -776,7 +776,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.java.md b/docs/dataVaultKvSecretsList.java.md index a4d83cdb..8f35c3e6 100644 --- a/docs/dataVaultKvSecretsList.java.md +++ b/docs/dataVaultKvSecretsList.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -41,7 +41,7 @@ DataVaultKvSecretsList.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full KV-V1 path where secrets will be listed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -757,7 +757,7 @@ DataVaultKvSecretsListConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | path | java.lang.String | Full KV-V1 path where secrets will be listed. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -842,7 +842,7 @@ public java.lang.String getPath(); Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -854,7 +854,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -871,7 +871,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.python.md b/docs/dataVaultKvSecretsList.python.md index 9d9b0e33..249788d9 100644 --- a/docs/dataVaultKvSecretsList.python.md +++ b/docs/dataVaultKvSecretsList.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -39,7 +39,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsList( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full KV-V1 path where secrets will be listed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ dataVaultKvSecretsList.DataVaultKvSecretsListConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Full KV-V1 path where secrets will be listed. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ path: str Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -884,7 +884,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -901,7 +901,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsList.typescript.md b/docs/dataVaultKvSecretsList.typescript.md index de8ff841..f62cd8b9 100644 --- a/docs/dataVaultKvSecretsList.typescript.md +++ b/docs/dataVaultKvSecretsList.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsList -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list vault_kv_secrets_list}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultKvSecretsList to The id of the existing DataVaultKvSecretsList that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#import import section} in the documentation of this resource for the id to use --- @@ -651,7 +651,7 @@ const dataVaultKvSecretsListConfig: dataVaultKvSecretsList.DataVaultKvSecretsLis | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Full KV-V1 path where secrets will be listed. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -736,7 +736,7 @@ public readonly path: string; Full KV-V1 path where secrets will be listed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#path DataVaultKvSecretsList#path} --- @@ -748,7 +748,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#id DataVaultKvSecretsList#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -765,7 +765,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list#namespace DataVaultKvSecretsList#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.csharp.md b/docs/dataVaultKvSecretsListV2.csharp.md index ee9db638..425ff36a 100644 --- a/docs/dataVaultKvSecretsListV2.csharp.md +++ b/docs/dataVaultKvSecretsListV2.csharp.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -703,7 +703,7 @@ new DataVaultKvSecretsListV2Config { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Mount | string | Path where KV-V2 engine is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | Name | string | Full named path of the secret. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -789,7 +789,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -801,7 +801,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -834,7 +834,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.go.md b/docs/dataVaultKvSecretsListV2.go.md index c66e5f78..1998884f 100644 --- a/docs/dataVaultKvSecretsListV2.go.md +++ b/docs/dataVaultKvSecretsListV2.go.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -703,7 +703,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultkvsecretslis | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Mount | *string | Path where KV-V2 engine is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | Name | *string | Full named path of the secret. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -789,7 +789,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -801,7 +801,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -820,7 +820,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -834,7 +834,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.java.md b/docs/dataVaultKvSecretsListV2.java.md index af28605c..1ff3706f 100644 --- a/docs/dataVaultKvSecretsListV2.java.md +++ b/docs/dataVaultKvSecretsListV2.java.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -42,7 +42,7 @@ DataVaultKvSecretsListV2.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | java.lang.String | Full named path of the secret. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -137,7 +137,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- @@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -812,7 +812,7 @@ DataVaultKvSecretsListV2Config.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | mount | java.lang.String | Path where KV-V2 engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | java.lang.String | Full named path of the secret. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -898,7 +898,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -910,7 +910,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -929,7 +929,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.python.md b/docs/dataVaultKvSecretsListV2.python.md index b02f585f..3abfed57 100644 --- a/docs/dataVaultKvSecretsListV2.python.md +++ b/docs/dataVaultKvSecretsListV2.python.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -40,7 +40,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | str | Full named path of the secret. | | namespace | str | Target namespace. (requires Enterprise). | @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- @@ -525,7 +525,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -842,7 +842,7 @@ dataVaultKvSecretsListV2.DataVaultKvSecretsListV2Config( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | Path where KV-V2 engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | str | Full named path of the secret. | | namespace | str | Target namespace. (requires Enterprise). | @@ -928,7 +928,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -940,7 +940,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultKvSecretsListV2.typescript.md b/docs/dataVaultKvSecretsListV2.typescript.md index ec2078a4..85567fb0 100644 --- a/docs/dataVaultKvSecretsListV2.typescript.md +++ b/docs/dataVaultKvSecretsListV2.typescript.md @@ -4,7 +4,7 @@ ### DataVaultKvSecretsListV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2 vault_kv_secrets_list_v2}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultKvSecretsListV2 t The id of the existing DataVaultKvSecretsListV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#import import section} in the documentation of this resource for the id to use --- @@ -691,7 +691,7 @@ const dataVaultKvSecretsListV2Config: dataVaultKvSecretsListV2.DataVaultKvSecret | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | Path where KV-V2 engine is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. | | name | string | Full named path of the secret. | | namespace | string | Target namespace. (requires Enterprise). | @@ -777,7 +777,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#mount DataVaultKvSecretsListV2#mount} --- @@ -789,7 +789,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#id DataVaultKvSecretsListV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -808,7 +808,7 @@ Full named path of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#name DataVaultKvSecretsListV2#name} --- @@ -822,7 +822,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/kv_secrets_list_v2#namespace DataVaultKvSecretsListV2#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.csharp.md b/docs/dataVaultLdapDynamicCredentials.csharp.md index 3e6453d8..7b68060a 100644 --- a/docs/dataVaultLdapDynamicCredentials.csharp.md +++ b/docs/dataVaultLdapDynamicCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ new DataVaultLdapDynamicCredentialsConfig { | Provisioners | object[] | *No description.* | | Mount | string | LDAP Secret Backend to read credentials from. | | RoleName | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ public string Mount { get; set; } LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -840,7 +840,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -852,7 +852,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -869,7 +869,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.go.md b/docs/dataVaultLdapDynamicCredentials.go.md index e846593e..f0a627d9 100644 --- a/docs/dataVaultLdapDynamicCredentials.go.md +++ b/docs/dataVaultLdapDynamicCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapdynamicc | Provisioners | *[]interface{} | *No description.* | | Mount | *string | LDAP Secret Backend to read credentials from. | | RoleName | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ Mount *string LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -840,7 +840,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -852,7 +852,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -869,7 +869,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.java.md b/docs/dataVaultLdapDynamicCredentials.java.md index dba17e0c..40559640 100644 --- a/docs/dataVaultLdapDynamicCredentials.java.md +++ b/docs/dataVaultLdapDynamicCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultLdapDynamicCredentials.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -848,7 +848,7 @@ DataVaultLdapDynamicCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -933,7 +933,7 @@ public java.lang.String getMount(); LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -947,7 +947,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -959,7 +959,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.python.md b/docs/dataVaultLdapDynamicCredentials.python.md index 0b13b5f6..339050a9 100644 --- a/docs/dataVaultLdapDynamicCredentials.python.md +++ b/docs/dataVaultLdapDynamicCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -878,7 +878,7 @@ dataVaultLdapDynamicCredentials.DataVaultLdapDynamicCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -963,7 +963,7 @@ mount: str LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -977,7 +977,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -989,7 +989,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1006,7 +1006,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapDynamicCredentials.typescript.md b/docs/dataVaultLdapDynamicCredentials.typescript.md index 561cf6ee..b7bf0c5b 100644 --- a/docs/dataVaultLdapDynamicCredentials.typescript.md +++ b/docs/dataVaultLdapDynamicCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultLdapDynamicCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials vault_ldap_dynamic_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapDynamicCreden The id of the existing DataVaultLdapDynamicCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#import import section} in the documentation of this resource for the id to use --- @@ -729,7 +729,7 @@ const dataVaultLdapDynamicCredentialsConfig: dataVaultLdapDynamicCredentials.Dat | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | LDAP Secret Backend to read credentials from. | | roleName | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -814,7 +814,7 @@ public readonly mount: string; LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#mount DataVaultLdapDynamicCredentials#mount} --- @@ -828,7 +828,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#role_name DataVaultLdapDynamicCredentials#role_name} --- @@ -840,7 +840,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#id DataVaultLdapDynamicCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -857,7 +857,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_dynamic_credentials#namespace DataVaultLdapDynamicCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.csharp.md b/docs/dataVaultLdapStaticCredentials.csharp.md index 4bd18417..fabd2a6d 100644 --- a/docs/dataVaultLdapStaticCredentials.csharp.md +++ b/docs/dataVaultLdapStaticCredentials.csharp.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -752,7 +752,7 @@ new DataVaultLdapStaticCredentialsConfig { | Provisioners | object[] | *No description.* | | Mount | string | LDAP Secret Backend to read credentials from. | | RoleName | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ public string Mount { get; set; } LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -851,7 +851,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -863,7 +863,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.go.md b/docs/dataVaultLdapStaticCredentials.go.md index b5d0f481..b2a0afba 100644 --- a/docs/dataVaultLdapStaticCredentials.go.md +++ b/docs/dataVaultLdapStaticCredentials.go.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -752,7 +752,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultldapstaticcr | Provisioners | *[]interface{} | *No description.* | | Mount | *string | LDAP Secret Backend to read credentials from. | | RoleName | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ Mount *string LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -851,7 +851,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -863,7 +863,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -880,7 +880,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.java.md b/docs/dataVaultLdapStaticCredentials.java.md index 4df8c9d3..138ecbbd 100644 --- a/docs/dataVaultLdapStaticCredentials.java.md +++ b/docs/dataVaultLdapStaticCredentials.java.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -43,7 +43,7 @@ DataVaultLdapStaticCredentials.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -859,7 +859,7 @@ DataVaultLdapStaticCredentialsConfig.builder() | provisioners | java.util.List | *No description.* | | mount | java.lang.String | LDAP Secret Backend to read credentials from. | | roleName | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -944,7 +944,7 @@ public java.lang.String getMount(); LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -958,7 +958,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -970,7 +970,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -987,7 +987,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.python.md b/docs/dataVaultLdapStaticCredentials.python.md index 657f7057..a647c535 100644 --- a/docs/dataVaultLdapStaticCredentials.python.md +++ b/docs/dataVaultLdapStaticCredentials.python.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -41,7 +41,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentials( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -889,7 +889,7 @@ dataVaultLdapStaticCredentials.DataVaultLdapStaticCredentialsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | mount | str | LDAP Secret Backend to read credentials from. | | role_name | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -974,7 +974,7 @@ mount: str LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -988,7 +988,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -1000,7 +1000,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1017,7 +1017,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultLdapStaticCredentials.typescript.md b/docs/dataVaultLdapStaticCredentials.typescript.md index 7f82efd7..996e4f9a 100644 --- a/docs/dataVaultLdapStaticCredentials.typescript.md +++ b/docs/dataVaultLdapStaticCredentials.typescript.md @@ -4,7 +4,7 @@ ### DataVaultLdapStaticCredentials -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials vault_ldap_static_credentials}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultLdapStaticCredent The id of the existing DataVaultLdapStaticCredentials that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#import import section} in the documentation of this resource for the id to use --- @@ -740,7 +740,7 @@ const dataVaultLdapStaticCredentialsConfig: dataVaultLdapStaticCredentials.DataV | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | mount | string | LDAP Secret Backend to read credentials from. | | roleName | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -825,7 +825,7 @@ public readonly mount: string; LDAP Secret Backend to read credentials from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#mount DataVaultLdapStaticCredentials#mount} --- @@ -839,7 +839,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#role_name DataVaultLdapStaticCredentials#role_name} --- @@ -851,7 +851,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#id DataVaultLdapStaticCredentials#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -868,7 +868,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/ldap_static_credentials#namespace DataVaultLdapStaticCredentials#namespace} --- diff --git a/docs/dataVaultNamespace.csharp.md b/docs/dataVaultNamespace.csharp.md index 149a6ff7..ded2e1d5 100644 --- a/docs/dataVaultNamespace.csharp.md +++ b/docs/dataVaultNamespace.csharp.md @@ -4,7 +4,7 @@ ### DataVaultNamespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo The id of the existing DataVaultNamespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -690,7 +690,7 @@ new DataVaultNamespaceConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Namespace path. | @@ -774,7 +774,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -791,7 +791,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -805,7 +805,7 @@ public string Path { get; set; } Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- diff --git a/docs/dataVaultNamespace.go.md b/docs/dataVaultNamespace.go.md index 8059afdc..bfb6c94a 100644 --- a/docs/dataVaultNamespace.go.md +++ b/docs/dataVaultNamespace.go.md @@ -4,7 +4,7 @@ ### DataVaultNamespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo The id of the existing DataVaultNamespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -690,7 +690,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnamespace" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Namespace path. | @@ -774,7 +774,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -791,7 +791,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -805,7 +805,7 @@ Path *string Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- diff --git a/docs/dataVaultNamespace.java.md b/docs/dataVaultNamespace.java.md index 10d5257a..1635d711 100644 --- a/docs/dataVaultNamespace.java.md +++ b/docs/dataVaultNamespace.java.md @@ -4,7 +4,7 @@ ### DataVaultNamespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}. #### Initializers @@ -40,7 +40,7 @@ DataVaultNamespace.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Namespace path. | @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -123,7 +123,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- @@ -477,7 +477,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo The id of the existing DataVaultNamespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -785,7 +785,7 @@ DataVaultNamespaceConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Namespace path. | @@ -869,7 +869,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -886,7 +886,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -900,7 +900,7 @@ public java.lang.String getPath(); Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- diff --git a/docs/dataVaultNamespace.python.md b/docs/dataVaultNamespace.python.md index 33552912..3dc559f7 100644 --- a/docs/dataVaultNamespace.python.md +++ b/docs/dataVaultNamespace.python.md @@ -4,7 +4,7 @@ ### DataVaultNamespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}. #### Initializers @@ -38,7 +38,7 @@ dataVaultNamespace.DataVaultNamespace( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Namespace path. | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- @@ -511,7 +511,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo The id of the existing DataVaultNamespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -815,7 +815,7 @@ dataVaultNamespace.DataVaultNamespaceConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Namespace path. | @@ -899,7 +899,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -916,7 +916,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -930,7 +930,7 @@ path: str Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- diff --git a/docs/dataVaultNamespace.typescript.md b/docs/dataVaultNamespace.typescript.md index 13026acb..5e258f6a 100644 --- a/docs/dataVaultNamespace.typescript.md +++ b/docs/dataVaultNamespace.typescript.md @@ -4,7 +4,7 @@ ### DataVaultNamespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace vault_namespace}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultNamespace to impo The id of the existing DataVaultNamespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -679,7 +679,7 @@ const dataVaultNamespaceConfig: dataVaultNamespace.DataVaultNamespaceConfig = { | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Namespace path. | @@ -763,7 +763,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#id DataVaultNamespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#id DataVaultNamespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -780,7 +780,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#namespace DataVaultNamespace#namespace} --- @@ -794,7 +794,7 @@ public readonly path: string; Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespace#path DataVaultNamespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespace#path DataVaultNamespace#path} --- diff --git a/docs/dataVaultNamespaces.csharp.md b/docs/dataVaultNamespaces.csharp.md index 4d008d6f..d3c9b893 100644 --- a/docs/dataVaultNamespaces.csharp.md +++ b/docs/dataVaultNamespaces.csharp.md @@ -4,7 +4,7 @@ ### DataVaultNamespaces -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp The id of the existing DataVaultNamespaces that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use --- @@ -638,7 +638,7 @@ new DataVaultNamespacesConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -721,7 +721,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -738,7 +738,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- diff --git a/docs/dataVaultNamespaces.go.md b/docs/dataVaultNamespaces.go.md index 90957cb1..a08352fa 100644 --- a/docs/dataVaultNamespaces.go.md +++ b/docs/dataVaultNamespaces.go.md @@ -4,7 +4,7 @@ ### DataVaultNamespaces -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp The id of the existing DataVaultNamespaces that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use --- @@ -638,7 +638,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnamespaces" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -721,7 +721,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -738,7 +738,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- diff --git a/docs/dataVaultNamespaces.java.md b/docs/dataVaultNamespaces.java.md index b909550e..6d71cc22 100644 --- a/docs/dataVaultNamespaces.java.md +++ b/docs/dataVaultNamespaces.java.md @@ -4,7 +4,7 @@ ### DataVaultNamespaces -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}. #### Initializers @@ -39,7 +39,7 @@ DataVaultNamespaces.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- @@ -458,7 +458,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp The id of the existing DataVaultNamespaces that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use --- @@ -721,7 +721,7 @@ DataVaultNamespacesConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -804,7 +804,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -821,7 +821,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- diff --git a/docs/dataVaultNamespaces.python.md b/docs/dataVaultNamespaces.python.md index 28818333..f4331a3a 100644 --- a/docs/dataVaultNamespaces.python.md +++ b/docs/dataVaultNamespaces.python.md @@ -4,7 +4,7 @@ ### DataVaultNamespaces -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}. #### Initializers @@ -37,7 +37,7 @@ dataVaultNamespaces.DataVaultNamespaces( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -106,7 +106,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -119,7 +119,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- @@ -492,7 +492,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp The id of the existing DataVaultNamespaces that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use --- @@ -751,7 +751,7 @@ dataVaultNamespaces.DataVaultNamespacesConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -834,7 +834,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -851,7 +851,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- diff --git a/docs/dataVaultNamespaces.typescript.md b/docs/dataVaultNamespaces.typescript.md index 877547f8..9d42c135 100644 --- a/docs/dataVaultNamespaces.typescript.md +++ b/docs/dataVaultNamespaces.typescript.md @@ -4,7 +4,7 @@ ### DataVaultNamespaces -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces vault_namespaces}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces vault_namespaces}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNamespaces to imp The id of the existing DataVaultNamespaces that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#import import section} in the documentation of this resource for the id to use --- @@ -628,7 +628,7 @@ const dataVaultNamespacesConfig: dataVaultNamespaces.DataVaultNamespacesConfig = | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -711,7 +711,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#id DataVaultNamespaces#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -728,7 +728,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/namespaces#namespace DataVaultNamespaces#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.csharp.md b/docs/dataVaultNomadAccessToken.csharp.md index b82443f1..77e33915 100644 --- a/docs/dataVaultNomadAccessToken.csharp.md +++ b/docs/dataVaultNomadAccessToken.csharp.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ new DataVaultNomadAccessTokenConfig { | Provisioners | object[] | *No description.* | | Backend | string | Nomad secret backend to generate tokens from. | | Role | string | Name of the role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ public string Backend { get; set; } Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -796,7 +796,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -808,7 +808,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.go.md b/docs/dataVaultNomadAccessToken.go.md index ab291e03..72a2ed8c 100644 --- a/docs/dataVaultNomadAccessToken.go.md +++ b/docs/dataVaultNomadAccessToken.go.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -697,7 +697,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultnomadaccesst | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Nomad secret backend to generate tokens from. | | Role | *string | Name of the role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -782,7 +782,7 @@ Backend *string Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -796,7 +796,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -808,7 +808,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -825,7 +825,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.java.md b/docs/dataVaultNomadAccessToken.java.md index 24f2aaca..e6e0f1d3 100644 --- a/docs/dataVaultNomadAccessToken.java.md +++ b/docs/dataVaultNomadAccessToken.java.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -43,7 +43,7 @@ DataVaultNomadAccessToken.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Nomad secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -804,7 +804,7 @@ DataVaultNomadAccessTokenConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Nomad secret backend to generate tokens from. | | role | java.lang.String | Name of the role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -889,7 +889,7 @@ public java.lang.String getBackend(); Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -903,7 +903,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -915,7 +915,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -932,7 +932,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.python.md b/docs/dataVaultNomadAccessToken.python.md index 56e984d8..e1380b11 100644 --- a/docs/dataVaultNomadAccessToken.python.md +++ b/docs/dataVaultNomadAccessToken.python.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -41,7 +41,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessToken( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Nomad secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ dataVaultNomadAccessToken.DataVaultNomadAccessTokenConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Nomad secret backend to generate tokens from. | | role | str | Name of the role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ backend: str Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -933,7 +933,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -945,7 +945,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -962,7 +962,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultNomadAccessToken.typescript.md b/docs/dataVaultNomadAccessToken.typescript.md index 86f5e6fb..212036dd 100644 --- a/docs/dataVaultNomadAccessToken.typescript.md +++ b/docs/dataVaultNomadAccessToken.typescript.md @@ -4,7 +4,7 @@ ### DataVaultNomadAccessToken -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token vault_nomad_access_token}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultNomadAccessToken The id of the existing DataVaultNomadAccessToken that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#import import section} in the documentation of this resource for the id to use --- @@ -685,7 +685,7 @@ const dataVaultNomadAccessTokenConfig: dataVaultNomadAccessToken.DataVaultNomadA | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Nomad secret backend to generate tokens from. | | role | string | Name of the role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -770,7 +770,7 @@ public readonly backend: string; Nomad secret backend to generate tokens from. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#backend DataVaultNomadAccessToken#backend} --- @@ -784,7 +784,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#role DataVaultNomadAccessToken#role} --- @@ -796,7 +796,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#id DataVaultNomadAccessToken#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -813,7 +813,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/nomad_access_token#namespace DataVaultNomadAccessToken#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendConfigEst.csharp.md b/docs/dataVaultPkiSecretBackendConfigEst.csharp.md index 06eee68d..9fefa8d1 100644 --- a/docs/dataVaultPkiSecretBackendConfigEst.csharp.md +++ b/docs/dataVaultPkiSecretBackendConfigEst.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -752,7 +752,7 @@ new DataVaultPkiSecretBackendConfigEstConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Backend | string | Path where PKI engine is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ public string Backend { get; set; } Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -849,7 +849,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -866,7 +866,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendConfigEst.go.md b/docs/dataVaultPkiSecretBackendConfigEst.go.md index 9094a8d4..8953ac09 100644 --- a/docs/dataVaultPkiSecretBackendConfigEst.go.md +++ b/docs/dataVaultPkiSecretBackendConfigEst.go.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -752,7 +752,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Path where PKI engine is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -837,7 +837,7 @@ Backend *string Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -849,7 +849,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -866,7 +866,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendConfigEst.java.md b/docs/dataVaultPkiSecretBackendConfigEst.java.md index 11181746..323189f9 100644 --- a/docs/dataVaultPkiSecretBackendConfigEst.java.md +++ b/docs/dataVaultPkiSecretBackendConfigEst.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPkiSecretBackendConfigEst.Builder.create(Construct scope, java.lang.Str | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Path where PKI engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +846,7 @@ DataVaultPkiSecretBackendConfigEstConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Path where PKI engine is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -931,7 +931,7 @@ public java.lang.String getBackend(); Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -943,7 +943,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -960,7 +960,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendConfigEst.python.md b/docs/dataVaultPkiSecretBackendConfigEst.python.md index 249c840d..28c36622 100644 --- a/docs/dataVaultPkiSecretBackendConfigEst.python.md +++ b/docs/dataVaultPkiSecretBackendConfigEst.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -39,7 +39,7 @@ dataVaultPkiSecretBackendConfigEst.DataVaultPkiSecretBackendConfigEst( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Path where PKI engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ dataVaultPkiSecretBackendConfigEst.DataVaultPkiSecretBackendConfigEstConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Path where PKI engine is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -960,7 +960,7 @@ backend: str Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -972,7 +972,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendConfigEst.typescript.md b/docs/dataVaultPkiSecretBackendConfigEst.typescript.md index b1f2dd56..fa52fc3e 100644 --- a/docs/dataVaultPkiSecretBackendConfigEst.typescript.md +++ b/docs/dataVaultPkiSecretBackendConfigEst.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendC The id of the existing DataVaultPkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -739,7 +739,7 @@ const dataVaultPkiSecretBackendConfigEstConfig: dataVaultPkiSecretBackendConfigE | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Path where PKI engine is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -824,7 +824,7 @@ public readonly backend: string; Path where PKI engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#backend DataVaultPkiSecretBackendConfigEst#backend} --- @@ -836,7 +836,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#id DataVaultPkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -853,7 +853,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_config_est#namespace DataVaultPkiSecretBackendConfigEst#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.csharp.md b/docs/dataVaultPkiSecretBackendIssuer.csharp.md index 06b392d4..812aff9e 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuer.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -763,7 +763,7 @@ new DataVaultPkiSecretBackendIssuerConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | IssuerRef | string | Reference to an existing issuer. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -848,7 +848,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -862,7 +862,7 @@ public string IssuerRef { get; set; } Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -874,7 +874,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -891,7 +891,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.go.md b/docs/dataVaultPkiSecretBackendIssuer.go.md index 4b5bca49..8ec8f561 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.go.md +++ b/docs/dataVaultPkiSecretBackendIssuer.go.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -763,7 +763,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | IssuerRef | *string | Reference to an existing issuer. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -848,7 +848,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -862,7 +862,7 @@ IssuerRef *string Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -874,7 +874,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -891,7 +891,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.java.md b/docs/dataVaultPkiSecretBackendIssuer.java.md index 8c514ddb..53ef78f6 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.java.md +++ b/docs/dataVaultPkiSecretBackendIssuer.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -43,7 +43,7 @@ DataVaultPkiSecretBackendIssuer.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | issuerRef | java.lang.String | Reference to an existing issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -870,7 +870,7 @@ DataVaultPkiSecretBackendIssuerConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | issuerRef | java.lang.String | Reference to an existing issuer. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -955,7 +955,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -969,7 +969,7 @@ public java.lang.String getIssuerRef(); Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -981,7 +981,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -998,7 +998,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.python.md b/docs/dataVaultPkiSecretBackendIssuer.python.md index 0091096e..2ccdc585 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.python.md +++ b/docs/dataVaultPkiSecretBackendIssuer.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -41,7 +41,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuer( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | issuer_ref | str | Reference to an existing issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ dataVaultPkiSecretBackendIssuer.DataVaultPkiSecretBackendIssuerConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | issuer_ref | str | Reference to an existing issuer. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -985,7 +985,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -999,7 +999,7 @@ issuer_ref: str Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -1011,7 +1011,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuer.typescript.md b/docs/dataVaultPkiSecretBackendIssuer.typescript.md index 9de48986..98152eef 100644 --- a/docs/dataVaultPkiSecretBackendIssuer.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuer.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuer -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer vault_pki_secret_backend_issuer}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuer that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#import import section} in the documentation of this resource for the id to use --- @@ -751,7 +751,7 @@ const dataVaultPkiSecretBackendIssuerConfig: dataVaultPkiSecretBackendIssuer.Dat | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | issuerRef | string | Reference to an existing issuer. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -836,7 +836,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#backend DataVaultPkiSecretBackendIssuer#backend} --- @@ -850,7 +850,7 @@ public readonly issuerRef: string; Reference to an existing issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#issuer_ref DataVaultPkiSecretBackendIssuer#issuer_ref} --- @@ -862,7 +862,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#id DataVaultPkiSecretBackendIssuer#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -879,7 +879,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuer#namespace DataVaultPkiSecretBackendIssuer#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.csharp.md b/docs/dataVaultPkiSecretBackendIssuers.csharp.md index 9db47e2a..cb06d38c 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.csharp.md +++ b/docs/dataVaultPkiSecretBackendIssuers.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendIssuersConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -781,7 +781,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.go.md b/docs/dataVaultPkiSecretBackendIssuers.go.md index 4630cd1f..581bccc2 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.go.md +++ b/docs/dataVaultPkiSecretBackendIssuers.go.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -781,7 +781,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.java.md b/docs/dataVaultPkiSecretBackendIssuers.java.md index 9768419a..1560f205 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.java.md +++ b/docs/dataVaultPkiSecretBackendIssuers.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPkiSecretBackendIssuers.Builder.create(Construct scope, java.lang.Strin | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -779,7 +779,7 @@ DataVaultPkiSecretBackendIssuersConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -864,7 +864,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -876,7 +876,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.python.md b/docs/dataVaultPkiSecretBackendIssuers.python.md index 569be48b..a1eba22d 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.python.md +++ b/docs/dataVaultPkiSecretBackendIssuers.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -39,7 +39,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuers( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ dataVaultPkiSecretBackendIssuers.DataVaultPkiSecretBackendIssuersConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -894,7 +894,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -906,7 +906,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -923,7 +923,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendIssuers.typescript.md b/docs/dataVaultPkiSecretBackendIssuers.typescript.md index 2f1472bf..6035666d 100644 --- a/docs/dataVaultPkiSecretBackendIssuers.typescript.md +++ b/docs/dataVaultPkiSecretBackendIssuers.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendIssuers -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers vault_pki_secret_backend_issuers}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendI The id of the existing DataVaultPkiSecretBackendIssuers that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendIssuersConfig: dataVaultPkiSecretBackendIssuers.D | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#backend DataVaultPkiSecretBackendIssuers#backend} --- @@ -770,7 +770,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#id DataVaultPkiSecretBackendIssuers#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_issuers#namespace DataVaultPkiSecretBackendIssuers#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.csharp.md b/docs/dataVaultPkiSecretBackendKey.csharp.md index af02de8e..9f49d55a 100644 --- a/docs/dataVaultPkiSecretBackendKey.csharp.md +++ b/docs/dataVaultPkiSecretBackendKey.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ new DataVaultPkiSecretBackendKeyConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | KeyRef | string | Reference to an existing key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -807,7 +807,7 @@ public string KeyRef { get; set; } Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -819,7 +819,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.go.md b/docs/dataVaultPkiSecretBackendKey.go.md index f3dff06b..c676f23e 100644 --- a/docs/dataVaultPkiSecretBackendKey.go.md +++ b/docs/dataVaultPkiSecretBackendKey.go.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -708,7 +708,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | KeyRef | *string | Reference to an existing key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -793,7 +793,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -807,7 +807,7 @@ KeyRef *string Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -819,7 +819,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -836,7 +836,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.java.md b/docs/dataVaultPkiSecretBackendKey.java.md index 069dd12f..098ae618 100644 --- a/docs/dataVaultPkiSecretBackendKey.java.md +++ b/docs/dataVaultPkiSecretBackendKey.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -43,7 +43,7 @@ DataVaultPkiSecretBackendKey.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | keyRef | java.lang.String | Reference to an existing key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- @@ -482,7 +482,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -815,7 +815,7 @@ DataVaultPkiSecretBackendKeyConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | keyRef | java.lang.String | Reference to an existing key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -900,7 +900,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -914,7 +914,7 @@ public java.lang.String getKeyRef(); Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -926,7 +926,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -943,7 +943,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.python.md b/docs/dataVaultPkiSecretBackendKey.python.md index a349bf5f..c3c57efc 100644 --- a/docs/dataVaultPkiSecretBackendKey.python.md +++ b/docs/dataVaultPkiSecretBackendKey.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -41,7 +41,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKey( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | key_ref | str | Reference to an existing key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- @@ -516,7 +516,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -845,7 +845,7 @@ dataVaultPkiSecretBackendKey.DataVaultPkiSecretBackendKeyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | key_ref | str | Reference to an existing key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -930,7 +930,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -944,7 +944,7 @@ key_ref: str Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -956,7 +956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -973,7 +973,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKey.typescript.md b/docs/dataVaultPkiSecretBackendKey.typescript.md index ed8e49cb..df7c4c7e 100644 --- a/docs/dataVaultPkiSecretBackendKey.typescript.md +++ b/docs/dataVaultPkiSecretBackendKey.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key vault_pki_secret_backend_key}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#import import section} in the documentation of this resource for the id to use --- @@ -696,7 +696,7 @@ const dataVaultPkiSecretBackendKeyConfig: dataVaultPkiSecretBackendKey.DataVault | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | keyRef | string | Reference to an existing key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -781,7 +781,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#backend DataVaultPkiSecretBackendKey#backend} --- @@ -795,7 +795,7 @@ public readonly keyRef: string; Reference to an existing key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#key_ref DataVaultPkiSecretBackendKey#key_ref} --- @@ -807,7 +807,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#id DataVaultPkiSecretBackendKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -824,7 +824,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_key#namespace DataVaultPkiSecretBackendKey#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.csharp.md b/docs/dataVaultPkiSecretBackendKeys.csharp.md index ad2af80c..c9c3aca5 100644 --- a/docs/dataVaultPkiSecretBackendKeys.csharp.md +++ b/docs/dataVaultPkiSecretBackendKeys.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ new DataVaultPkiSecretBackendKeysConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -781,7 +781,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.go.md b/docs/dataVaultPkiSecretBackendKeys.go.md index 163580da..0cf1d2e9 100644 --- a/docs/dataVaultPkiSecretBackendKeys.go.md +++ b/docs/dataVaultPkiSecretBackendKeys.go.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -684,7 +684,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpkisecretbac | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -769,7 +769,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -781,7 +781,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -798,7 +798,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.java.md b/docs/dataVaultPkiSecretBackendKeys.java.md index 1d02c389..019bbacc 100644 --- a/docs/dataVaultPkiSecretBackendKeys.java.md +++ b/docs/dataVaultPkiSecretBackendKeys.java.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPkiSecretBackendKeys.Builder.create(Construct scope, java.lang.String i | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- @@ -470,7 +470,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -779,7 +779,7 @@ DataVaultPkiSecretBackendKeysConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -864,7 +864,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -876,7 +876,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -893,7 +893,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.python.md b/docs/dataVaultPkiSecretBackendKeys.python.md index 63bfe7b6..512c98fa 100644 --- a/docs/dataVaultPkiSecretBackendKeys.python.md +++ b/docs/dataVaultPkiSecretBackendKeys.python.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -39,7 +39,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeys( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -118,7 +118,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -131,7 +131,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- @@ -504,7 +504,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -809,7 +809,7 @@ dataVaultPkiSecretBackendKeys.DataVaultPkiSecretBackendKeysConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -894,7 +894,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -906,7 +906,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -923,7 +923,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPkiSecretBackendKeys.typescript.md b/docs/dataVaultPkiSecretBackendKeys.typescript.md index 62df36e9..794a38f9 100644 --- a/docs/dataVaultPkiSecretBackendKeys.typescript.md +++ b/docs/dataVaultPkiSecretBackendKeys.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPkiSecretBackendKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys vault_pki_secret_backend_keys}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultPkiSecretBackendK The id of the existing DataVaultPkiSecretBackendKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#import import section} in the documentation of this resource for the id to use --- @@ -673,7 +673,7 @@ const dataVaultPkiSecretBackendKeysConfig: dataVaultPkiSecretBackendKeys.DataVau | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -758,7 +758,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#backend DataVaultPkiSecretBackendKeys#backend} --- @@ -770,7 +770,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#id DataVaultPkiSecretBackendKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -787,7 +787,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/pki_secret_backend_keys#namespace DataVaultPkiSecretBackendKeys#namespace} --- diff --git a/docs/dataVaultPolicyDocument.csharp.md b/docs/dataVaultPolicyDocument.csharp.md index 764bcfb3..378448b8 100644 --- a/docs/dataVaultPolicyDocument.csharp.md +++ b/docs/dataVaultPolicyDocument.csharp.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -681,7 +681,7 @@ new DataVaultPolicyDocumentConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Rule | object | rule block. | @@ -765,7 +765,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -782,7 +782,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -796,7 +796,7 @@ public object Rule { get; set; } rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -823,14 +823,14 @@ new DataVaultPolicyDocumentRule { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| Capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | AllowedParameter | object | allowed_parameter block. | | DeniedParameter | object | denied_parameter block. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| MaxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| MinWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| RequiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| MaxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| MinWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| RequiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -842,7 +842,7 @@ public string[] Capabilities { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -854,7 +854,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -868,7 +868,7 @@ public object AllowedParameter { get; set; } allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -882,7 +882,7 @@ public object DeniedParameter { get; set; } denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -894,7 +894,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -906,7 +906,7 @@ public string MaxWrappingTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -918,7 +918,7 @@ public string MinWrappingTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -930,7 +930,7 @@ public string[] RequiredParameters { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -951,8 +951,8 @@ new DataVaultPolicyDocumentRuleAllowedParameter { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -964,7 +964,7 @@ public string Key { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -976,7 +976,7 @@ public string[] Value { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -997,8 +997,8 @@ new DataVaultPolicyDocumentRuleDeniedParameter { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1010,7 +1010,7 @@ public string Key { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1022,7 +1022,7 @@ public string[] Value { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.go.md b/docs/dataVaultPolicyDocument.go.md index 6033e055..70f679ef 100644 --- a/docs/dataVaultPolicyDocument.go.md +++ b/docs/dataVaultPolicyDocument.go.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -681,7 +681,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Rule | interface{} | rule block. | @@ -765,7 +765,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -782,7 +782,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -796,7 +796,7 @@ Rule interface{} rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -823,14 +823,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Capabilities | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| Capabilities | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | AllowedParameter | interface{} | allowed_parameter block. | | DeniedParameter | interface{} | denied_parameter block. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| MaxWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| MinWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| RequiredParameters | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| MaxWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| MinWrappingTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| RequiredParameters | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -842,7 +842,7 @@ Capabilities *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -854,7 +854,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -868,7 +868,7 @@ AllowedParameter interface{} allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -882,7 +882,7 @@ DeniedParameter interface{} denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -894,7 +894,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -906,7 +906,7 @@ MaxWrappingTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -918,7 +918,7 @@ MinWrappingTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -930,7 +930,7 @@ RequiredParameters *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -951,8 +951,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -964,7 +964,7 @@ Key *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -976,7 +976,7 @@ Value *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -997,8 +997,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultpolicydocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| Key | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| Value | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1010,7 +1010,7 @@ Key *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1022,7 +1022,7 @@ Value *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.java.md b/docs/dataVaultPolicyDocument.java.md index d2ca1161..0a369d23 100644 --- a/docs/dataVaultPolicyDocument.java.md +++ b/docs/dataVaultPolicyDocument.java.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -41,7 +41,7 @@ DataVaultPolicyDocument.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rule | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule> | rule block. | @@ -111,7 +111,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -124,7 +124,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -491,7 +491,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -778,7 +778,7 @@ DataVaultPolicyDocumentConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rule | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRule> | rule block. | @@ -862,7 +862,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -879,7 +879,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -893,7 +893,7 @@ public java.lang.Object getRule(); rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -922,14 +922,14 @@ DataVaultPolicyDocumentRule.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowedParameter | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleAllowedParameter> | allowed_parameter block. | | deniedParameter | com.hashicorp.cdktf.IResolvable OR java.util.List<DataVaultPolicyDocumentRuleDeniedParameter> | denied_parameter block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| maxWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| minWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| requiredParameters | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| maxWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| minWrappingTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| requiredParameters | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -941,7 +941,7 @@ public java.util.List getCapabilities(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -953,7 +953,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -967,7 +967,7 @@ public java.lang.Object getAllowedParameter(); allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -981,7 +981,7 @@ public java.lang.Object getDeniedParameter(); denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -993,7 +993,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -1005,7 +1005,7 @@ public java.lang.String getMaxWrappingTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -1017,7 +1017,7 @@ public java.lang.String getMinWrappingTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -1029,7 +1029,7 @@ public java.util.List getRequiredParameters(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -1050,8 +1050,8 @@ DataVaultPolicyDocumentRuleAllowedParameter.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1063,7 +1063,7 @@ public java.lang.String getKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1075,7 +1075,7 @@ public java.util.List getValue(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -1096,8 +1096,8 @@ DataVaultPolicyDocumentRuleDeniedParameter.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1109,7 +1109,7 @@ public java.lang.String getKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1121,7 +1121,7 @@ public java.util.List getValue(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.python.md b/docs/dataVaultPolicyDocument.python.md index 81ace2a6..4ba40271 100644 --- a/docs/dataVaultPolicyDocument.python.md +++ b/docs/dataVaultPolicyDocument.python.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -38,7 +38,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocument( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rule | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]] | rule block. | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -526,7 +526,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -808,7 +808,7 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rule | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRule]] | rule block. | @@ -892,7 +892,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -909,7 +909,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -923,7 +923,7 @@ rule: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentRule]] rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -950,14 +950,14 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRule( | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowed_parameter | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleAllowedParameter]] | allowed_parameter block. | | denied_parameter | typing.Union[cdktf.IResolvable, typing.List[DataVaultPolicyDocumentRuleDeniedParameter]] | denied_parameter block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| max_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| min_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| required_parameters | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| max_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| min_wrapping_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| required_parameters | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -969,7 +969,7 @@ capabilities: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -981,7 +981,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -995,7 +995,7 @@ allowed_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocument allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -1009,7 +1009,7 @@ denied_parameter: typing.Union[IResolvable, typing.List[DataVaultPolicyDocumentR denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -1021,7 +1021,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -1033,7 +1033,7 @@ max_wrapping_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -1045,7 +1045,7 @@ min_wrapping_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -1057,7 +1057,7 @@ required_parameters: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -1078,8 +1078,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleAllowedParameter( | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1091,7 +1091,7 @@ key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1103,7 +1103,7 @@ value: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -1124,8 +1124,8 @@ dataVaultPolicyDocument.DataVaultPolicyDocumentRuleDeniedParameter( | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -1137,7 +1137,7 @@ key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -1149,7 +1149,7 @@ value: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultPolicyDocument.typescript.md b/docs/dataVaultPolicyDocument.typescript.md index 1d2b14dc..55170e2b 100644 --- a/docs/dataVaultPolicyDocument.typescript.md +++ b/docs/dataVaultPolicyDocument.typescript.md @@ -4,7 +4,7 @@ ### DataVaultPolicyDocument -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document vault_policy_document}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document vault_policy_document}. #### Initializers @@ -399,7 +399,7 @@ The construct id used in the generated config for the DataVaultPolicyDocument to The id of the existing DataVaultPolicyDocument that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#import import section} in the documentation of this resource for the id to use --- @@ -670,7 +670,7 @@ const dataVaultPolicyDocumentConfig: dataVaultPolicyDocument.DataVaultPolicyDocu | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rule | cdktf.IResolvable \| DataVaultPolicyDocumentRule[] | rule block. | @@ -754,7 +754,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#id DataVaultPolicyDocument#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -771,7 +771,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#namespace DataVaultPolicyDocument#namespace} --- @@ -785,7 +785,7 @@ public readonly rule: IResolvable | DataVaultPolicyDocumentRule[]; rule block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#rule DataVaultPolicyDocument#rule} --- @@ -803,14 +803,14 @@ const dataVaultPolicyDocumentRule: dataVaultPolicyDocument.DataVaultPolicyDocume | **Name** | **Type** | **Description** | | --- | --- | --- | -| capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | +| capabilities | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. | | allowedParameter | cdktf.IResolvable \| DataVaultPolicyDocumentRuleAllowedParameter[] | allowed_parameter block. | | deniedParameter | cdktf.IResolvable \| DataVaultPolicyDocumentRuleDeniedParameter[] | denied_parameter block. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | -| maxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | -| minWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | -| requiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. | +| maxWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. | +| minWrappingTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. | +| requiredParameters | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. | --- @@ -822,7 +822,7 @@ public readonly capabilities: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#capabilities DataVaultPolicyDocument#capabilities}. --- @@ -834,7 +834,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#path DataVaultPolicyDocument#path}. --- @@ -848,7 +848,7 @@ public readonly allowedParameter: IResolvable | DataVaultPolicyDocumentRuleAllow allowed_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#allowed_parameter DataVaultPolicyDocument#allowed_parameter} --- @@ -862,7 +862,7 @@ public readonly deniedParameter: IResolvable | DataVaultPolicyDocumentRuleDenied denied_parameter block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#denied_parameter DataVaultPolicyDocument#denied_parameter} --- @@ -874,7 +874,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#description DataVaultPolicyDocument#description}. --- @@ -886,7 +886,7 @@ public readonly maxWrappingTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#max_wrapping_ttl DataVaultPolicyDocument#max_wrapping_ttl}. --- @@ -898,7 +898,7 @@ public readonly minWrappingTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#min_wrapping_ttl DataVaultPolicyDocument#min_wrapping_ttl}. --- @@ -910,7 +910,7 @@ public readonly requiredParameters: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#required_parameters DataVaultPolicyDocument#required_parameters}. --- @@ -928,8 +928,8 @@ const dataVaultPolicyDocumentRuleAllowedParameter: dataVaultPolicyDocument.DataV | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -941,7 +941,7 @@ public readonly key: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -953,7 +953,7 @@ public readonly value: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- @@ -971,8 +971,8 @@ const dataVaultPolicyDocumentRuleDeniedParameter: dataVaultPolicyDocument.DataVa | **Name** | **Type** | **Description** | | --- | --- | --- | -| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | -| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | +| key | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. | +| value | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. | --- @@ -984,7 +984,7 @@ public readonly key: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#key DataVaultPolicyDocument#key}. --- @@ -996,7 +996,7 @@ public readonly value: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/policy_document#value DataVaultPolicyDocument#value}. --- diff --git a/docs/dataVaultRaftAutopilotState.csharp.md b/docs/dataVaultRaftAutopilotState.csharp.md index 39e0cec0..a0c39b3f 100644 --- a/docs/dataVaultRaftAutopilotState.csharp.md +++ b/docs/dataVaultRaftAutopilotState.csharp.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -748,7 +748,7 @@ new DataVaultRaftAutopilotStateConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -831,7 +831,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -848,7 +848,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.go.md b/docs/dataVaultRaftAutopilotState.go.md index 37f5d56f..998bf9f0 100644 --- a/docs/dataVaultRaftAutopilotState.go.md +++ b/docs/dataVaultRaftAutopilotState.go.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -748,7 +748,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaultraftautopilo | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -831,7 +831,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -848,7 +848,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.java.md b/docs/dataVaultRaftAutopilotState.java.md index 53513a41..4870d8e2 100644 --- a/docs/dataVaultRaftAutopilotState.java.md +++ b/docs/dataVaultRaftAutopilotState.java.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -39,7 +39,7 @@ DataVaultRaftAutopilotState.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -121,7 +121,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- @@ -458,7 +458,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -831,7 +831,7 @@ DataVaultRaftAutopilotStateConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -914,7 +914,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -931,7 +931,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.python.md b/docs/dataVaultRaftAutopilotState.python.md index 8fce7b73..30f9f775 100644 --- a/docs/dataVaultRaftAutopilotState.python.md +++ b/docs/dataVaultRaftAutopilotState.python.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -37,7 +37,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotState( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -106,7 +106,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -119,7 +119,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- @@ -492,7 +492,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -861,7 +861,7 @@ dataVaultRaftAutopilotState.DataVaultRaftAutopilotStateConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -944,7 +944,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultRaftAutopilotState.typescript.md b/docs/dataVaultRaftAutopilotState.typescript.md index af946d1e..f4d81de3 100644 --- a/docs/dataVaultRaftAutopilotState.typescript.md +++ b/docs/dataVaultRaftAutopilotState.typescript.md @@ -4,7 +4,7 @@ ### DataVaultRaftAutopilotState -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state vault_raft_autopilot_state}. #### Initializers @@ -379,7 +379,7 @@ The construct id used in the generated config for the DataVaultRaftAutopilotStat The id of the existing DataVaultRaftAutopilotState that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#import import section} in the documentation of this resource for the id to use --- @@ -738,7 +738,7 @@ const dataVaultRaftAutopilotStateConfig: dataVaultRaftAutopilotState.DataVaultRa | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -821,7 +821,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#id DataVaultRaftAutopilotState#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -838,7 +838,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/raft_autopilot_state#namespace DataVaultRaftAutopilotState#namespace} --- diff --git a/docs/dataVaultTransformDecode.csharp.md b/docs/dataVaultTransformDecode.csharp.md index f8ebe9e3..17dded81 100644 --- a/docs/dataVaultTransformDecode.csharp.md +++ b/docs/dataVaultTransformDecode.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ new DataVaultTransformDecodeConfig { | BatchInput | object | Specifies a list of items to be decoded in a single batch. | | BatchResults | object | The result of decoding batch_input. | | DecodedValue | string | The result of decoding a value. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Transformation | string | The transformation to perform. | | Tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -960,7 +960,7 @@ public string RoleName { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -990,7 +990,7 @@ public object BatchResults { get; set; } The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1004,7 +1004,7 @@ public string DecodedValue { get; set; } The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1016,7 +1016,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1063,7 +1063,7 @@ public string Tweak { get; set; } The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1077,7 +1077,7 @@ public string Value { get; set; } The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.go.md b/docs/dataVaultTransformDecode.go.md index a90ae071..22a75a30 100644 --- a/docs/dataVaultTransformDecode.go.md +++ b/docs/dataVaultTransformDecode.go.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformdec | BatchInput | interface{} | Specifies a list of items to be decoded in a single batch. | | BatchResults | interface{} | The result of decoding batch_input. | | DecodedValue | *string | The result of decoding a value. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Transformation | *string | The transformation to perform. | | Tweak | *string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ Path *string Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -960,7 +960,7 @@ RoleName *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -990,7 +990,7 @@ BatchResults interface{} The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1004,7 +1004,7 @@ DecodedValue *string The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1016,7 +1016,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1063,7 +1063,7 @@ Tweak *string The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1077,7 +1077,7 @@ Value *string The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.java.md b/docs/dataVaultTransformDecode.java.md index fc1205b0..befbc46e 100644 --- a/docs/dataVaultTransformDecode.java.md +++ b/docs/dataVaultTransformDecode.java.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -54,7 +54,7 @@ DataVaultTransformDecode.Builder.create(Construct scope, java.lang.String id) | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be decoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of decoding batch_input. | | decodedValue | java.lang.String | The result of decoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -150,7 +150,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -203,7 +203,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- @@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ DataVaultTransformDecodeConfig.builder() | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be decoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of decoding batch_input. | | decodedValue | java.lang.String | The result of decoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -1133,7 +1133,7 @@ public java.lang.String getPath(); Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -1147,7 +1147,7 @@ public java.lang.String getRoleName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -1163,7 +1163,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults(); The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1191,7 +1191,7 @@ public java.lang.String getDecodedValue(); The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1203,7 +1203,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1220,7 +1220,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1236,7 +1236,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1250,7 +1250,7 @@ public java.lang.String getTweak(); The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1264,7 +1264,7 @@ public java.lang.String getValue(); The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.python.md b/docs/dataVaultTransformDecode.python.md index 04db532b..4f63e3e1 100644 --- a/docs/dataVaultTransformDecode.python.md +++ b/docs/dataVaultTransformDecode.python.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -50,7 +50,7 @@ dataVaultTransformDecode.DataVaultTransformDecode( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be decoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of decoding batch_input. | | decoded_value | str | The result of decoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -146,7 +146,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -199,7 +199,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- @@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -1071,7 +1071,7 @@ dataVaultTransformDecode.DataVaultTransformDecodeConfig( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be decoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of decoding batch_input. | | decoded_value | str | The result of decoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -1159,7 +1159,7 @@ path: str Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -1173,7 +1173,7 @@ role_name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -1189,7 +1189,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]] The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -1217,7 +1217,7 @@ decoded_value: str The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -1229,7 +1229,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1246,7 +1246,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1262,7 +1262,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1276,7 +1276,7 @@ tweak: str The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1290,7 +1290,7 @@ value: str The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformDecode.typescript.md b/docs/dataVaultTransformDecode.typescript.md index 832b38f9..c10b22bd 100644 --- a/docs/dataVaultTransformDecode.typescript.md +++ b/docs/dataVaultTransformDecode.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransformDecode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode vault_transform_decode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode vault_transform_decode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformDecode t The id of the existing DataVaultTransformDecode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const dataVaultTransformDecodeConfig: dataVaultTransformDecode.DataVaultTransfor | batchInput | cdktf.IResolvable \| {[ key: string ]: string}[] | Specifies a list of items to be decoded in a single batch. | | batchResults | cdktf.IResolvable \| {[ key: string ]: string}[] | The result of decoding batch_input. | | decodedValue | string | The result of decoding a value. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. | | namespace | string | Target namespace. (requires Enterprise). | | transformation | string | The transformation to perform. | | tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -928,7 +928,7 @@ public readonly path: string; Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#path DataVaultTransformDecode#path} --- @@ -942,7 +942,7 @@ public readonly roleName: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#role_name DataVaultTransformDecode#role_name} --- @@ -958,7 +958,7 @@ Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_input DataVaultTransformDecode#batch_input} --- @@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[]; The result of decoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#batch_results DataVaultTransformDecode#batch_results} --- @@ -986,7 +986,7 @@ public readonly decodedValue: string; The result of decoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#decoded_value DataVaultTransformDecode#decoded_value} --- @@ -998,7 +998,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#id DataVaultTransformDecode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1015,7 +1015,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#namespace DataVaultTransformDecode#namespace} --- @@ -1031,7 +1031,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#transformation DataVaultTransformDecode#transformation} --- @@ -1045,7 +1045,7 @@ public readonly tweak: string; The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#tweak DataVaultTransformDecode#tweak} --- @@ -1059,7 +1059,7 @@ public readonly value: string; The value in which to decode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_decode#value DataVaultTransformDecode#value} --- diff --git a/docs/dataVaultTransformEncode.csharp.md b/docs/dataVaultTransformEncode.csharp.md index 6d09635e..851f323f 100644 --- a/docs/dataVaultTransformEncode.csharp.md +++ b/docs/dataVaultTransformEncode.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ new DataVaultTransformEncodeConfig { | BatchInput | object | Specifies a list of items to be encoded in a single batch. | | BatchResults | object | The result of encoding batch_input. | | EncodedValue | string | The result of encoding a value. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Transformation | string | The transformation to perform. | | Tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -960,7 +960,7 @@ public string RoleName { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -990,7 +990,7 @@ public object BatchResults { get; set; } The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1004,7 +1004,7 @@ public string EncodedValue { get; set; } The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1016,7 +1016,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1063,7 +1063,7 @@ public string Tweak { get; set; } The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1077,7 +1077,7 @@ public string Value { get; set; } The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.go.md b/docs/dataVaultTransformEncode.go.md index e6c8c2b9..cff13494 100644 --- a/docs/dataVaultTransformEncode.go.md +++ b/docs/dataVaultTransformEncode.go.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransformenc | BatchInput | interface{} | Specifies a list of items to be encoded in a single batch. | | BatchResults | interface{} | The result of encoding batch_input. | | EncodedValue | *string | The result of encoding a value. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Transformation | *string | The transformation to perform. | | Tweak | *string | The tweak value to use. Only applicable for FPE transformations. | @@ -946,7 +946,7 @@ Path *string Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -960,7 +960,7 @@ RoleName *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -976,7 +976,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -990,7 +990,7 @@ BatchResults interface{} The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1004,7 +1004,7 @@ EncodedValue *string The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1016,7 +1016,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1033,7 +1033,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1049,7 +1049,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1063,7 +1063,7 @@ Tweak *string The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1077,7 +1077,7 @@ Value *string The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.java.md b/docs/dataVaultTransformEncode.java.md index 0c78f4a0..46d62d5f 100644 --- a/docs/dataVaultTransformEncode.java.md +++ b/docs/dataVaultTransformEncode.java.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -54,7 +54,7 @@ DataVaultTransformEncode.Builder.create(Construct scope, java.lang.String id) | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be encoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of encoding batch_input. | | encodedValue | java.lang.String | The result of encoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -150,7 +150,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -203,7 +203,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- @@ -602,7 +602,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ DataVaultTransformEncodeConfig.builder() | batchInput | com.hashicorp.cdktf.IResolvable OR java.util.List> | Specifies a list of items to be encoded in a single batch. | | batchResults | com.hashicorp.cdktf.IResolvable OR java.util.List> | The result of encoding batch_input. | | encodedValue | java.lang.String | The result of encoding a value. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | transformation | java.lang.String | The transformation to perform. | | tweak | java.lang.String | The tweak value to use. Only applicable for FPE transformations. | @@ -1133,7 +1133,7 @@ public java.lang.String getPath(); Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -1147,7 +1147,7 @@ public java.lang.String getRoleName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -1163,7 +1163,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -1177,7 +1177,7 @@ public java.lang.Object getBatchResults(); The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1191,7 +1191,7 @@ public java.lang.String getEncodedValue(); The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1203,7 +1203,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1220,7 +1220,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1236,7 +1236,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1250,7 +1250,7 @@ public java.lang.String getTweak(); The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1264,7 +1264,7 @@ public java.lang.String getValue(); The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.python.md b/docs/dataVaultTransformEncode.python.md index 101ae0ea..efd5736d 100644 --- a/docs/dataVaultTransformEncode.python.md +++ b/docs/dataVaultTransformEncode.python.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -50,7 +50,7 @@ dataVaultTransformEncode.DataVaultTransformEncode( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be encoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of encoding batch_input. | | encoded_value | str | The result of encoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -146,7 +146,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -199,7 +199,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- @@ -634,7 +634,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -1071,7 +1071,7 @@ dataVaultTransformEncode.DataVaultTransformEncodeConfig( | batch_input | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | Specifies a list of items to be encoded in a single batch. | | batch_results | typing.Union[cdktf.IResolvable, typing.List[typing.Mapping[str]]] | The result of encoding batch_input. | | encoded_value | str | The result of encoding a value. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | str | Target namespace. (requires Enterprise). | | transformation | str | The transformation to perform. | | tweak | str | The tweak value to use. Only applicable for FPE transformations. | @@ -1159,7 +1159,7 @@ path: str Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -1173,7 +1173,7 @@ role_name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -1189,7 +1189,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -1203,7 +1203,7 @@ batch_results: typing.Union[IResolvable, typing.List[typing.Mapping[str]]] The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -1217,7 +1217,7 @@ encoded_value: str The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -1229,7 +1229,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1246,7 +1246,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1262,7 +1262,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1276,7 +1276,7 @@ tweak: str The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1290,7 +1290,7 @@ value: str The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransformEncode.typescript.md b/docs/dataVaultTransformEncode.typescript.md index 1dfe39b6..e7818e59 100644 --- a/docs/dataVaultTransformEncode.typescript.md +++ b/docs/dataVaultTransformEncode.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransformEncode -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode vault_transform_encode}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode vault_transform_encode}. #### Initializers @@ -421,7 +421,7 @@ The construct id used in the generated config for the DataVaultTransformEncode t The id of the existing DataVaultTransformEncode that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const dataVaultTransformEncodeConfig: dataVaultTransformEncode.DataVaultTransfor | batchInput | cdktf.IResolvable \| {[ key: string ]: string}[] | Specifies a list of items to be encoded in a single batch. | | batchResults | cdktf.IResolvable \| {[ key: string ]: string}[] | The result of encoding batch_input. | | encodedValue | string | The result of encoding a value. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. | | namespace | string | Target namespace. (requires Enterprise). | | transformation | string | The transformation to perform. | | tweak | string | The tweak value to use. Only applicable for FPE transformations. | @@ -928,7 +928,7 @@ public readonly path: string; Path to backend from which to retrieve data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#path DataVaultTransformEncode#path} --- @@ -942,7 +942,7 @@ public readonly roleName: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#role_name DataVaultTransformEncode#role_name} --- @@ -958,7 +958,7 @@ Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_input DataVaultTransformEncode#batch_input} --- @@ -972,7 +972,7 @@ public readonly batchResults: IResolvable | {[ key: string ]: string}[]; The result of encoding batch_input. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#batch_results DataVaultTransformEncode#batch_results} --- @@ -986,7 +986,7 @@ public readonly encodedValue: string; The result of encoding a value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#encoded_value DataVaultTransformEncode#encoded_value} --- @@ -998,7 +998,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#id DataVaultTransformEncode#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1015,7 +1015,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#namespace DataVaultTransformEncode#namespace} --- @@ -1031,7 +1031,7 @@ The transformation to perform. If no value is provided and the role contains a single transformation, this value will be inferred from the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#transformation DataVaultTransformEncode#transformation} --- @@ -1045,7 +1045,7 @@ public readonly tweak: string; The tweak value to use. Only applicable for FPE transformations. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#tweak DataVaultTransformEncode#tweak} --- @@ -1059,7 +1059,7 @@ public readonly value: string; The value in which to encode. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transform_encode#value DataVaultTransformEncode#value} --- diff --git a/docs/dataVaultTransitDecrypt.csharp.md b/docs/dataVaultTransitDecrypt.csharp.md index c4a4d788..945e130c 100644 --- a/docs/dataVaultTransitDecrypt.csharp.md +++ b/docs/dataVaultTransitDecrypt.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ new DataVaultTransitDecryptConfig { | Ciphertext | string | Transit encrypted cipher text. | | Key | string | Name of the decryption key to use. | | Context | string | Specifies the context for key derivation. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ public string Backend { get; set; } The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -840,7 +840,7 @@ public string Ciphertext { get; set; } Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -854,7 +854,7 @@ public string Key { get; set; } Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -868,7 +868,7 @@ public string Context { get; set; } Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -880,7 +880,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.go.md b/docs/dataVaultTransitDecrypt.go.md index 251a5acd..1658d077 100644 --- a/docs/dataVaultTransitDecrypt.go.md +++ b/docs/dataVaultTransitDecrypt.go.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -741,7 +741,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitdecry | Ciphertext | *string | Transit encrypted cipher text. | | Key | *string | Name of the decryption key to use. | | Context | *string | Specifies the context for key derivation. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -826,7 +826,7 @@ Backend *string The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -840,7 +840,7 @@ Ciphertext *string Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -854,7 +854,7 @@ Key *string Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -868,7 +868,7 @@ Context *string Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -880,7 +880,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -897,7 +897,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.java.md b/docs/dataVaultTransitDecrypt.java.md index 043a9161..b597544f 100644 --- a/docs/dataVaultTransitDecrypt.java.md +++ b/docs/dataVaultTransitDecrypt.java.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -47,7 +47,7 @@ DataVaultTransitDecrypt.Builder.create(Construct scope, java.lang.String id) | ciphertext | java.lang.String | Transit encrypted cipher text. | | key | java.lang.String | Name of the decryption key to use. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- @@ -513,7 +513,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ DataVaultTransitDecryptConfig.builder() | ciphertext | java.lang.String | Transit encrypted cipher text. | | key | java.lang.String | Name of the decryption key to use. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ public java.lang.String getBackend(); The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -971,7 +971,7 @@ public java.lang.String getCiphertext(); Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -985,7 +985,7 @@ public java.lang.String getKey(); Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -999,7 +999,7 @@ public java.lang.String getContext(); Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -1011,7 +1011,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.python.md b/docs/dataVaultTransitDecrypt.python.md index 98cc04bd..36ff2844 100644 --- a/docs/dataVaultTransitDecrypt.python.md +++ b/docs/dataVaultTransitDecrypt.python.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -45,7 +45,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecrypt( | ciphertext | str | Transit encrypted cipher text. | | key | str | Name of the decryption key to use. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- @@ -547,7 +547,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -902,7 +902,7 @@ dataVaultTransitDecrypt.DataVaultTransitDecryptConfig( | ciphertext | str | Transit encrypted cipher text. | | key | str | Name of the decryption key to use. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -987,7 +987,7 @@ backend: str The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -1001,7 +1001,7 @@ ciphertext: str Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -1015,7 +1015,7 @@ key: str Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -1029,7 +1029,7 @@ context: str Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -1041,7 +1041,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1058,7 +1058,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitDecrypt.typescript.md b/docs/dataVaultTransitDecrypt.typescript.md index 32a8c611..14a482b3 100644 --- a/docs/dataVaultTransitDecrypt.typescript.md +++ b/docs/dataVaultTransitDecrypt.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransitDecrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt vault_transit_decrypt}. #### Initializers @@ -386,7 +386,7 @@ The construct id used in the generated config for the DataVaultTransitDecrypt to The id of the existing DataVaultTransitDecrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#import import section} in the documentation of this resource for the id to use --- @@ -727,7 +727,7 @@ const dataVaultTransitDecryptConfig: dataVaultTransitDecrypt.DataVaultTransitDec | ciphertext | string | Transit encrypted cipher text. | | key | string | Name of the decryption key to use. | | context | string | Specifies the context for key derivation. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -812,7 +812,7 @@ public readonly backend: string; The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#backend DataVaultTransitDecrypt#backend} --- @@ -826,7 +826,7 @@ public readonly ciphertext: string; Transit encrypted cipher text. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#ciphertext DataVaultTransitDecrypt#ciphertext} --- @@ -840,7 +840,7 @@ public readonly key: string; Name of the decryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#key DataVaultTransitDecrypt#key} --- @@ -854,7 +854,7 @@ public readonly context: string; Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#context DataVaultTransitDecrypt#context} --- @@ -866,7 +866,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#id DataVaultTransitDecrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -883,7 +883,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_decrypt#namespace DataVaultTransitDecrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.csharp.md b/docs/dataVaultTransitEncrypt.csharp.md index 1e270c55..3ab289f3 100644 --- a/docs/dataVaultTransitEncrypt.csharp.md +++ b/docs/dataVaultTransitEncrypt.csharp.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -771,7 +771,7 @@ new DataVaultTransitEncryptConfig { | Key | string | Name of the encryption key to use. | | Plaintext | string | Map of strings read from Vault. | | Context | string | Specifies the context for key derivation. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | KeyVersion | double | The version of the key to use for encryption. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -857,7 +857,7 @@ public string Backend { get; set; } The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -871,7 +871,7 @@ public string Key { get; set; } Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -885,7 +885,7 @@ public string Plaintext { get; set; } Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -899,7 +899,7 @@ public string Context { get; set; } Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -911,7 +911,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ public double KeyVersion { get; set; } The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -942,7 +942,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.go.md b/docs/dataVaultTransitEncrypt.go.md index 4c744b65..783f7afe 100644 --- a/docs/dataVaultTransitEncrypt.go.md +++ b/docs/dataVaultTransitEncrypt.go.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -771,7 +771,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/datavaulttransitencry | Key | *string | Name of the encryption key to use. | | Plaintext | *string | Map of strings read from Vault. | | Context | *string | Specifies the context for key derivation. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | KeyVersion | *f64 | The version of the key to use for encryption. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -857,7 +857,7 @@ Backend *string The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -871,7 +871,7 @@ Key *string Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -885,7 +885,7 @@ Plaintext *string Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -899,7 +899,7 @@ Context *string Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -911,7 +911,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -928,7 +928,7 @@ KeyVersion *f64 The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -942,7 +942,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.java.md b/docs/dataVaultTransitEncrypt.java.md index b8569fb1..32ff38aa 100644 --- a/docs/dataVaultTransitEncrypt.java.md +++ b/docs/dataVaultTransitEncrypt.java.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -48,7 +48,7 @@ DataVaultTransitEncrypt.Builder.create(Construct scope, java.lang.String id) | key | java.lang.String | Name of the encryption key to use. | | plaintext | java.lang.String | Map of strings read from Vault. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | java.lang.Number | The version of the key to use for encryption. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- @@ -532,7 +532,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ DataVaultTransitEncryptConfig.builder() | key | java.lang.String | Name of the encryption key to use. | | plaintext | java.lang.String | Map of strings read from Vault. | | context | java.lang.String | Specifies the context for key derivation. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | java.lang.Number | The version of the key to use for encryption. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1000,7 +1000,7 @@ public java.lang.String getBackend(); The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -1014,7 +1014,7 @@ public java.lang.String getKey(); Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -1028,7 +1028,7 @@ public java.lang.String getPlaintext(); Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -1042,7 +1042,7 @@ public java.lang.String getContext(); Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -1054,7 +1054,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1071,7 +1071,7 @@ public java.lang.Number getKeyVersion(); The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -1085,7 +1085,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.python.md b/docs/dataVaultTransitEncrypt.python.md index 94c87030..a4adfe4c 100644 --- a/docs/dataVaultTransitEncrypt.python.md +++ b/docs/dataVaultTransitEncrypt.python.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -46,7 +46,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncrypt( | key | str | Name of the encryption key to use. | | plaintext | str | Map of strings read from Vault. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | key_version | typing.Union[int, float] | The version of the key to use for encryption. | | namespace | str | Target namespace. (requires Enterprise). | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- @@ -566,7 +566,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ dataVaultTransitEncrypt.DataVaultTransitEncryptConfig( | key | str | Name of the encryption key to use. | | plaintext | str | Map of strings read from Vault. | | context | str | Specifies the context for key derivation. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | key_version | typing.Union[int, float] | The version of the key to use for encryption. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1030,7 +1030,7 @@ backend: str The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -1044,7 +1044,7 @@ key: str Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -1058,7 +1058,7 @@ plaintext: str Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -1072,7 +1072,7 @@ context: str Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -1084,7 +1084,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ key_version: typing.Union[int, float] The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -1115,7 +1115,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/dataVaultTransitEncrypt.typescript.md b/docs/dataVaultTransitEncrypt.typescript.md index b4f4fe8e..f129aeb3 100644 --- a/docs/dataVaultTransitEncrypt.typescript.md +++ b/docs/dataVaultTransitEncrypt.typescript.md @@ -4,7 +4,7 @@ ### DataVaultTransitEncrypt -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt vault_transit_encrypt}. #### Initializers @@ -393,7 +393,7 @@ The construct id used in the generated config for the DataVaultTransitEncrypt to The id of the existing DataVaultTransitEncrypt that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#import import section} in the documentation of this resource for the id to use --- @@ -756,7 +756,7 @@ const dataVaultTransitEncryptConfig: dataVaultTransitEncrypt.DataVaultTransitEnc | key | string | Name of the encryption key to use. | | plaintext | string | Map of strings read from Vault. | | context | string | Specifies the context for key derivation. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. | | keyVersion | number | The version of the key to use for encryption. | | namespace | string | Target namespace. (requires Enterprise). | @@ -842,7 +842,7 @@ public readonly backend: string; The Transit secret backend the key belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#backend DataVaultTransitEncrypt#backend} --- @@ -856,7 +856,7 @@ public readonly key: string; Name of the encryption key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key DataVaultTransitEncrypt#key} --- @@ -870,7 +870,7 @@ public readonly plaintext: string; Map of strings read from Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#plaintext DataVaultTransitEncrypt#plaintext} --- @@ -884,7 +884,7 @@ public readonly context: string; Specifies the context for key derivation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#context DataVaultTransitEncrypt#context} --- @@ -896,7 +896,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#id DataVaultTransitEncrypt#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -913,7 +913,7 @@ public readonly keyVersion: number; The version of the key to use for encryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#key_version DataVaultTransitEncrypt#key_version} --- @@ -927,7 +927,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/data-sources/transit_encrypt#namespace DataVaultTransitEncrypt#namespace} --- diff --git a/docs/databaseSecretBackendConnection.csharp.md b/docs/databaseSecretBackendConnection.csharp.md index 5a8e6068..47bc23ad 100644 --- a/docs/databaseSecretBackendConnection.csharp.md +++ b/docs/databaseSecretBackendConnection.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1681,6 +1681,7 @@ new DatabaseSecretBackendConnectionCassandra { string PemJson = null, double Port = null, double ProtocolVersion = null, + object SkipVerification = null, object Tls = null, string Username = null }; @@ -1698,6 +1699,7 @@ new DatabaseSecretBackendConnectionCassandra { | PemJson | string | Specifies JSON containing a certificate and private key; | | Port | double | The transport port to use to connect to Cassandra. | | ProtocolVersion | double | The CQL protocol version to use. | +| SkipVerification | object | Skip permissions checks when a connection to Cassandra is first created. | | Tls | object | Whether to use TLS when connecting to Cassandra. | | Username | string | The username to use when authenticating with Cassandra. | @@ -1713,7 +1715,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1727,7 +1729,7 @@ public string[] Hosts { get; set; } Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1741,7 +1743,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1755,7 +1757,7 @@ public string Password { get; set; } The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1771,7 +1773,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1787,7 +1789,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1801,7 +1803,7 @@ public double Port { get; set; } The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1815,7 +1817,23 @@ public double ProtocolVersion { get; set; } The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +##### `SkipVerification`Optional + +```csharp +public object SkipVerification { get; set; } +``` + +- *Type:* object + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -1829,7 +1847,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1843,7 +1861,7 @@ public string Username { get; set; } The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1911,7 +1929,7 @@ new DatabaseSecretBackendConnectionConfig { | Data | System.Collections.Generic.IDictionary | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | Elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | Hana | DatabaseSecretBackendConnectionHana | hana block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | Influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | Mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | Mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2013,7 +2031,7 @@ public string Backend { get; set; } Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2027,7 +2045,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2041,7 +2059,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2055,7 +2073,7 @@ public DatabaseSecretBackendConnectionCassandra Cassandra { get; set; } cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2069,7 +2087,7 @@ public DatabaseSecretBackendConnectionCouchbase Couchbase { get; set; } couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2083,7 +2101,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2097,7 +2115,7 @@ public DatabaseSecretBackendConnectionElasticsearch Elasticsearch { get; set; } elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2111,7 +2129,7 @@ public DatabaseSecretBackendConnectionHana Hana { get; set; } hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2123,7 +2141,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2140,7 +2158,7 @@ public DatabaseSecretBackendConnectionInfluxdb Influxdb { get; set; } influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2154,7 +2172,7 @@ public DatabaseSecretBackendConnectionMongodb Mongodb { get; set; } mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2168,7 +2186,7 @@ public DatabaseSecretBackendConnectionMongodbatlas Mongodbatlas { get; set; } mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2182,7 +2200,7 @@ public DatabaseSecretBackendConnectionMssql Mssql { get; set; } mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2196,7 +2214,7 @@ public DatabaseSecretBackendConnectionMysql Mysql { get; set; } mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2210,7 +2228,7 @@ public DatabaseSecretBackendConnectionMysqlAurora MysqlAurora { get; set; } mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2224,7 +2242,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy MysqlLegacy { get; set; } mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2238,7 +2256,7 @@ public DatabaseSecretBackendConnectionMysqlRds MysqlRds { get; set; } mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2252,7 +2270,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2266,7 +2284,7 @@ public DatabaseSecretBackendConnectionOracle Oracle { get; set; } oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2282,7 +2300,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2296,7 +2314,7 @@ public DatabaseSecretBackendConnectionPostgresql Postgresql { get; set; } postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2310,7 +2328,7 @@ public DatabaseSecretBackendConnectionRedis Redis { get; set; } redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2324,7 +2342,7 @@ public DatabaseSecretBackendConnectionRedisElasticache RedisElasticache { get; s redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2338,7 +2356,7 @@ public DatabaseSecretBackendConnectionRedshift Redshift { get; set; } redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2352,7 +2370,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2366,7 +2384,7 @@ public DatabaseSecretBackendConnectionSnowflake Snowflake { get; set; } snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2380,7 +2398,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2428,7 +2446,7 @@ public string[] Hosts { get; set; } A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2442,7 +2460,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2456,7 +2474,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2472,7 +2490,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2486,7 +2504,7 @@ public string BucketName { get; set; } Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2500,7 +2518,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2514,7 +2532,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2528,7 +2546,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2580,7 +2598,7 @@ public string Password { get; set; } The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2594,7 +2612,7 @@ public string Url { get; set; } The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2608,7 +2626,7 @@ public string Username { get; set; } The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2622,7 +2640,7 @@ public string CaCert { get; set; } The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2636,7 +2654,7 @@ public string CaPath { get; set; } The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2650,7 +2668,7 @@ public string ClientCert { get; set; } The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2664,7 +2682,7 @@ public string ClientKey { get; set; } The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2678,7 +2696,7 @@ public object Insecure { get; set; } Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2692,7 +2710,7 @@ public string TlsServerName { get; set; } This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2706,7 +2724,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2752,7 +2770,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2766,7 +2784,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2780,7 +2798,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2794,7 +2812,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2808,7 +2826,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2822,7 +2840,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2836,7 +2854,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2888,7 +2906,7 @@ public string Host { get; set; } Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2902,7 +2920,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2916,7 +2934,7 @@ public string Username { get; set; } Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2930,7 +2948,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2944,7 +2962,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2960,7 +2978,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2976,7 +2994,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2990,7 +3008,7 @@ public double Port { get; set; } The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3004,7 +3022,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3018,7 +3036,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3064,7 +3082,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3078,7 +3096,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3092,7 +3110,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3106,7 +3124,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3120,7 +3138,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3134,7 +3152,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3148,7 +3166,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3186,7 +3204,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3200,7 +3218,7 @@ public string ProjectId { get; set; } The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3214,7 +3232,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3264,7 +3282,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3278,7 +3296,7 @@ public object ContainedDb { get; set; } Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3292,7 +3310,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3306,7 +3324,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3320,7 +3338,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3334,7 +3352,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3348,7 +3366,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3362,7 +3380,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3376,7 +3394,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3430,7 +3448,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3444,7 +3462,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3458,7 +3476,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3472,7 +3490,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3486,7 +3504,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3500,7 +3518,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3514,7 +3532,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3528,7 +3546,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3544,7 +3562,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3558,7 +3576,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3572,7 +3590,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3626,7 +3644,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3640,7 +3658,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3654,7 +3672,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3668,7 +3686,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3682,7 +3700,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3696,7 +3714,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3710,7 +3728,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3724,7 +3742,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3740,7 +3758,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3754,7 +3772,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3768,7 +3786,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3822,7 +3840,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3836,7 +3854,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3850,7 +3868,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3864,7 +3882,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3878,7 +3896,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3892,7 +3910,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3906,7 +3924,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3920,7 +3938,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3936,7 +3954,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3950,7 +3968,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3964,7 +3982,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4018,7 +4036,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4032,7 +4050,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4046,7 +4064,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4060,7 +4078,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4074,7 +4092,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4088,7 +4106,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4102,7 +4120,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4116,7 +4134,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4132,7 +4150,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4146,7 +4164,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4160,7 +4178,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4210,7 +4228,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4224,7 +4242,7 @@ public object DisconnectSessions { get; set; } Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4238,7 +4256,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4252,7 +4270,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4266,7 +4284,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4280,7 +4298,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4294,7 +4312,7 @@ public object SplitStatements { get; set; } Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4308,7 +4326,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4322,7 +4340,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4341,7 +4359,11 @@ new DatabaseSecretBackendConnectionPostgresql { double MaxIdleConnections = null, double MaxOpenConnections = null, string Password = null, + string PrivateKey = null, + object SelfManaged = null, string ServiceAccountJson = null, + string TlsCa = null, + string TlsCertificate = null, string Username = null, string UsernameTemplate = null }; @@ -4358,7 +4380,11 @@ new DatabaseSecretBackendConnectionPostgresql { | MaxIdleConnections | double | Maximum number of idle connections to the database. | | MaxOpenConnections | double | Maximum number of open connections to the database. | | Password | string | The root credential password used in the connection URL. | +| PrivateKey | string | The secret key used for the x509 client certificate. Must be PEM encoded. | +| SelfManaged | object | If set, allows onboarding static roles with a rootless connection configuration. | | ServiceAccountJson | string | A JSON encoded credential for use with IAM authorization. | +| TlsCa | string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| TlsCertificate | string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | Username | string | The root credential username used in the connection URL. | | UsernameTemplate | string | Username generation template. | @@ -4374,7 +4400,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4388,7 +4414,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4402,7 +4428,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4416,7 +4442,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4430,7 +4456,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4444,7 +4470,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4458,7 +4484,35 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +##### `PrivateKey`Optional + +```csharp +public string PrivateKey { get; set; } +``` + +- *Type:* string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +##### `SelfManaged`Optional + +```csharp +public object SelfManaged { get; set; } +``` + +- *Type:* object + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -4472,7 +4526,35 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +##### `TlsCa`Optional + +```csharp +public string TlsCa { get; set; } +``` + +- *Type:* string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +##### `TlsCertificate`Optional + +```csharp +public string TlsCertificate { get; set; } +``` + +- *Type:* string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -4486,7 +4568,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4500,7 +4582,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4546,7 +4628,7 @@ public string Host { get; set; } Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4560,7 +4642,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4574,7 +4656,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4588,7 +4670,7 @@ public string CaCert { get; set; } The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4602,7 +4684,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4616,7 +4698,7 @@ public double Port { get; set; } The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4630,7 +4712,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4670,7 +4752,7 @@ public string Url { get; set; } The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4686,7 +4768,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4702,7 +4784,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4718,7 +4800,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4766,7 +4848,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4780,7 +4862,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4794,7 +4876,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4808,7 +4890,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4822,7 +4904,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4836,7 +4918,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4850,7 +4932,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4864,7 +4946,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4910,7 +4992,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4924,7 +5006,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4938,7 +5020,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4952,7 +5034,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4966,7 +5048,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4980,7 +5062,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4994,7 +5076,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5058,6 +5140,7 @@ The attribute on the parent resource this class is referencing. | ResetPemJson | *No description.* | | ResetPort | *No description.* | | ResetProtocolVersion | *No description.* | +| ResetSkipVerification | *No description.* | | ResetTls | *No description.* | | ResetUsername | *No description.* | @@ -5261,6 +5344,12 @@ private void ResetPort() private void ResetProtocolVersion() ``` +##### `ResetSkipVerification` + +```csharp +private void ResetSkipVerification() +``` + ##### `ResetTls` ```csharp @@ -5288,6 +5377,7 @@ private void ResetUsername() | PemJsonInput | string | *No description.* | | PortInput | double | *No description.* | | ProtocolVersionInput | double | *No description.* | +| SkipVerificationInput | object | *No description.* | | TlsInput | object | *No description.* | | UsernameInput | string | *No description.* | | ConnectTimeout | double | *No description.* | @@ -5298,6 +5388,7 @@ private void ResetUsername() | PemJson | string | *No description.* | | Port | double | *No description.* | | ProtocolVersion | double | *No description.* | +| SkipVerification | object | *No description.* | | Tls | object | *No description.* | | Username | string | *No description.* | | InternalValue | DatabaseSecretBackendConnectionCassandra | *No description.* | @@ -5408,6 +5499,16 @@ public double ProtocolVersionInput { get; } --- +##### `SkipVerificationInput`Optional + +```csharp +public object SkipVerificationInput { get; } +``` + +- *Type:* object + +--- + ##### `TlsInput`Optional ```csharp @@ -5508,6 +5609,16 @@ public double ProtocolVersion { get; } --- +##### `SkipVerification`Required + +```csharp +public object SkipVerification { get; } +``` + +- *Type:* object + +--- + ##### `Tls`Required ```csharp @@ -11603,7 +11714,11 @@ The attribute on the parent resource this class is referencing. | ResetMaxIdleConnections | *No description.* | | ResetMaxOpenConnections | *No description.* | | ResetPassword | *No description.* | +| ResetPrivateKey | *No description.* | +| ResetSelfManaged | *No description.* | | ResetServiceAccountJson | *No description.* | +| ResetTlsCa | *No description.* | +| ResetTlsCertificate | *No description.* | | ResetUsername | *No description.* | | ResetUsernameTemplate | *No description.* | @@ -11801,12 +11916,36 @@ private void ResetMaxOpenConnections() private void ResetPassword() ``` +##### `ResetPrivateKey` + +```csharp +private void ResetPrivateKey() +``` + +##### `ResetSelfManaged` + +```csharp +private void ResetSelfManaged() +``` + ##### `ResetServiceAccountJson` ```csharp private void ResetServiceAccountJson() ``` +##### `ResetTlsCa` + +```csharp +private void ResetTlsCa() +``` + +##### `ResetTlsCertificate` + +```csharp +private void ResetTlsCertificate() +``` + ##### `ResetUsername` ```csharp @@ -11833,7 +11972,11 @@ private void ResetUsernameTemplate() | MaxIdleConnectionsInput | double | *No description.* | | MaxOpenConnectionsInput | double | *No description.* | | PasswordInput | string | *No description.* | +| PrivateKeyInput | string | *No description.* | +| SelfManagedInput | object | *No description.* | | ServiceAccountJsonInput | string | *No description.* | +| TlsCaInput | string | *No description.* | +| TlsCertificateInput | string | *No description.* | | UsernameInput | string | *No description.* | | UsernameTemplateInput | string | *No description.* | | AuthType | string | *No description.* | @@ -11843,7 +11986,11 @@ private void ResetUsernameTemplate() | MaxIdleConnections | double | *No description.* | | MaxOpenConnections | double | *No description.* | | Password | string | *No description.* | +| PrivateKey | string | *No description.* | +| SelfManaged | object | *No description.* | | ServiceAccountJson | string | *No description.* | +| TlsCa | string | *No description.* | +| TlsCertificate | string | *No description.* | | Username | string | *No description.* | | UsernameTemplate | string | *No description.* | | InternalValue | DatabaseSecretBackendConnectionPostgresql | *No description.* | @@ -11944,6 +12091,26 @@ public string PasswordInput { get; } --- +##### `PrivateKeyInput`Optional + +```csharp +public string PrivateKeyInput { get; } +``` + +- *Type:* string + +--- + +##### `SelfManagedInput`Optional + +```csharp +public object SelfManagedInput { get; } +``` + +- *Type:* object + +--- + ##### `ServiceAccountJsonInput`Optional ```csharp @@ -11954,6 +12121,26 @@ public string ServiceAccountJsonInput { get; } --- +##### `TlsCaInput`Optional + +```csharp +public string TlsCaInput { get; } +``` + +- *Type:* string + +--- + +##### `TlsCertificateInput`Optional + +```csharp +public string TlsCertificateInput { get; } +``` + +- *Type:* string + +--- + ##### `UsernameInput`Optional ```csharp @@ -12044,6 +12231,26 @@ public string Password { get; } --- +##### `PrivateKey`Required + +```csharp +public string PrivateKey { get; } +``` + +- *Type:* string + +--- + +##### `SelfManaged`Required + +```csharp +public object SelfManaged { get; } +``` + +- *Type:* object + +--- + ##### `ServiceAccountJson`Required ```csharp @@ -12054,6 +12261,26 @@ public string ServiceAccountJson { get; } --- +##### `TlsCa`Required + +```csharp +public string TlsCa { get; } +``` + +- *Type:* string + +--- + +##### `TlsCertificate`Required + +```csharp +public string TlsCertificate { get; } +``` + +- *Type:* string + +--- + ##### `Username`Required ```csharp diff --git a/docs/databaseSecretBackendConnection.go.md b/docs/databaseSecretBackendConnection.go.md index 439f3e79..28649a9e 100644 --- a/docs/databaseSecretBackendConnection.go.md +++ b/docs/databaseSecretBackendConnection.go.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1681,6 +1681,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend PemJson: *string, Port: *f64, ProtocolVersion: *f64, + SkipVerification: interface{}, Tls: interface{}, Username: *string, } @@ -1698,6 +1699,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend | PemJson | *string | Specifies JSON containing a certificate and private key; | | Port | *f64 | The transport port to use to connect to Cassandra. | | ProtocolVersion | *f64 | The CQL protocol version to use. | +| SkipVerification | interface{} | Skip permissions checks when a connection to Cassandra is first created. | | Tls | interface{} | Whether to use TLS when connecting to Cassandra. | | Username | *string | The username to use when authenticating with Cassandra. | @@ -1713,7 +1715,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1727,7 +1729,7 @@ Hosts *[]*string Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1741,7 +1743,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1755,7 +1757,7 @@ Password *string The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1771,7 +1773,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1787,7 +1789,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1801,7 +1803,7 @@ Port *f64 The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1815,7 +1817,23 @@ ProtocolVersion *f64 The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +##### `SkipVerification`Optional + +```go +SkipVerification interface{} +``` + +- *Type:* interface{} + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -1829,7 +1847,7 @@ Tls interface{} Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1843,7 +1861,7 @@ Username *string The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1911,7 +1929,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend | Data | *map[string]*string | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | Elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | Hana | DatabaseSecretBackendConnectionHana | hana block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | Influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | Mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | Mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2013,7 +2031,7 @@ Backend *string Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2027,7 +2045,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2041,7 +2059,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2055,7 +2073,7 @@ Cassandra DatabaseSecretBackendConnectionCassandra cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2069,7 +2087,7 @@ Couchbase DatabaseSecretBackendConnectionCouchbase couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2083,7 +2101,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2097,7 +2115,7 @@ Elasticsearch DatabaseSecretBackendConnectionElasticsearch elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2111,7 +2129,7 @@ Hana DatabaseSecretBackendConnectionHana hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2123,7 +2141,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2140,7 +2158,7 @@ Influxdb DatabaseSecretBackendConnectionInfluxdb influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2154,7 +2172,7 @@ Mongodb DatabaseSecretBackendConnectionMongodb mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2168,7 +2186,7 @@ Mongodbatlas DatabaseSecretBackendConnectionMongodbatlas mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2182,7 +2200,7 @@ Mssql DatabaseSecretBackendConnectionMssql mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2196,7 +2214,7 @@ Mysql DatabaseSecretBackendConnectionMysql mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2210,7 +2228,7 @@ MysqlAurora DatabaseSecretBackendConnectionMysqlAurora mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2224,7 +2242,7 @@ MysqlLegacy DatabaseSecretBackendConnectionMysqlLegacy mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2238,7 +2256,7 @@ MysqlRds DatabaseSecretBackendConnectionMysqlRds mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2252,7 +2270,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2266,7 +2284,7 @@ Oracle DatabaseSecretBackendConnectionOracle oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2282,7 +2300,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2296,7 +2314,7 @@ Postgresql DatabaseSecretBackendConnectionPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2310,7 +2328,7 @@ Redis DatabaseSecretBackendConnectionRedis redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2324,7 +2342,7 @@ RedisElasticache DatabaseSecretBackendConnectionRedisElasticache redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2338,7 +2356,7 @@ Redshift DatabaseSecretBackendConnectionRedshift redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2352,7 +2370,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2366,7 +2384,7 @@ Snowflake DatabaseSecretBackendConnectionSnowflake snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2380,7 +2398,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2428,7 +2446,7 @@ Hosts *[]*string A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2442,7 +2460,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2456,7 +2474,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2472,7 +2490,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2486,7 +2504,7 @@ BucketName *string Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2500,7 +2518,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2514,7 +2532,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2528,7 +2546,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2580,7 +2598,7 @@ Password *string The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2594,7 +2612,7 @@ Url *string The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2608,7 +2626,7 @@ Username *string The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2622,7 +2640,7 @@ CaCert *string The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2636,7 +2654,7 @@ CaPath *string The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2650,7 +2668,7 @@ ClientCert *string The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2664,7 +2682,7 @@ ClientKey *string The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2678,7 +2696,7 @@ Insecure interface{} Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2692,7 +2710,7 @@ TlsServerName *string This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2706,7 +2724,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2752,7 +2770,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2766,7 +2784,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2780,7 +2798,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2794,7 +2812,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2808,7 +2826,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2822,7 +2840,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2836,7 +2854,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2888,7 +2906,7 @@ Host *string Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2902,7 +2920,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2916,7 +2934,7 @@ Username *string Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2930,7 +2948,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2944,7 +2962,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2960,7 +2978,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2976,7 +2994,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2990,7 +3008,7 @@ Port *f64 The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3004,7 +3022,7 @@ Tls interface{} Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3018,7 +3036,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3064,7 +3082,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3078,7 +3096,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3092,7 +3110,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3106,7 +3124,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3120,7 +3138,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3134,7 +3152,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3148,7 +3166,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3186,7 +3204,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3200,7 +3218,7 @@ ProjectId *string The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3214,7 +3232,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3264,7 +3282,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3278,7 +3296,7 @@ ContainedDb interface{} Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3292,7 +3310,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3306,7 +3324,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3320,7 +3338,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3334,7 +3352,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3348,7 +3366,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3362,7 +3380,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3376,7 +3394,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3430,7 +3448,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3444,7 +3462,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3458,7 +3476,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3472,7 +3490,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3486,7 +3504,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3500,7 +3518,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3514,7 +3532,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3528,7 +3546,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3544,7 +3562,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3558,7 +3576,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3572,7 +3590,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3626,7 +3644,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3640,7 +3658,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3654,7 +3672,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3668,7 +3686,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3682,7 +3700,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3696,7 +3714,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3710,7 +3728,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3724,7 +3742,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3740,7 +3758,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3754,7 +3772,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3768,7 +3786,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3822,7 +3840,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3836,7 +3854,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3850,7 +3868,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3864,7 +3882,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3878,7 +3896,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3892,7 +3910,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3906,7 +3924,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3920,7 +3938,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3936,7 +3954,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3950,7 +3968,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3964,7 +3982,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4018,7 +4036,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4032,7 +4050,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4046,7 +4064,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4060,7 +4078,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4074,7 +4092,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4088,7 +4106,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4102,7 +4120,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4116,7 +4134,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4132,7 +4150,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4146,7 +4164,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4160,7 +4178,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4210,7 +4228,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4224,7 +4242,7 @@ DisconnectSessions interface{} Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4238,7 +4256,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4252,7 +4270,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4266,7 +4284,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4280,7 +4298,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4294,7 +4312,7 @@ SplitStatements interface{} Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4308,7 +4326,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4322,7 +4340,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4341,7 +4359,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend MaxIdleConnections: *f64, MaxOpenConnections: *f64, Password: *string, + PrivateKey: *string, + SelfManaged: interface{}, ServiceAccountJson: *string, + TlsCa: *string, + TlsCertificate: *string, Username: *string, UsernameTemplate: *string, } @@ -4358,7 +4380,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend | MaxIdleConnections | *f64 | Maximum number of idle connections to the database. | | MaxOpenConnections | *f64 | Maximum number of open connections to the database. | | Password | *string | The root credential password used in the connection URL. | +| PrivateKey | *string | The secret key used for the x509 client certificate. Must be PEM encoded. | +| SelfManaged | interface{} | If set, allows onboarding static roles with a rootless connection configuration. | | ServiceAccountJson | *string | A JSON encoded credential for use with IAM authorization. | +| TlsCa | *string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| TlsCertificate | *string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | Username | *string | The root credential username used in the connection URL. | | UsernameTemplate | *string | Username generation template. | @@ -4374,7 +4400,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4388,7 +4414,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4402,7 +4428,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4416,7 +4442,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4430,7 +4456,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4444,7 +4470,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4458,7 +4484,35 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +##### `PrivateKey`Optional + +```go +PrivateKey *string +``` + +- *Type:* *string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +##### `SelfManaged`Optional + +```go +SelfManaged interface{} +``` + +- *Type:* interface{} + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -4472,7 +4526,35 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +##### `TlsCa`Optional + +```go +TlsCa *string +``` + +- *Type:* *string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +##### `TlsCertificate`Optional + +```go +TlsCertificate *string +``` + +- *Type:* *string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -4486,7 +4568,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4500,7 +4582,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4546,7 +4628,7 @@ Host *string Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4560,7 +4642,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4574,7 +4656,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4588,7 +4670,7 @@ CaCert *string The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4602,7 +4684,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4616,7 +4698,7 @@ Port *f64 The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4630,7 +4712,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4670,7 +4752,7 @@ Url *string The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4686,7 +4768,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4702,7 +4784,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4718,7 +4800,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4766,7 +4848,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4780,7 +4862,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4794,7 +4876,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4808,7 +4890,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4822,7 +4904,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4836,7 +4918,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4850,7 +4932,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4864,7 +4946,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4910,7 +4992,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4924,7 +5006,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4938,7 +5020,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4952,7 +5034,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4966,7 +5048,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4980,7 +5062,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4994,7 +5076,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5058,6 +5140,7 @@ The attribute on the parent resource this class is referencing. | ResetPemJson | *No description.* | | ResetPort | *No description.* | | ResetProtocolVersion | *No description.* | +| ResetSkipVerification | *No description.* | | ResetTls | *No description.* | | ResetUsername | *No description.* | @@ -5261,6 +5344,12 @@ func ResetPort() func ResetProtocolVersion() ``` +##### `ResetSkipVerification` + +```go +func ResetSkipVerification() +``` + ##### `ResetTls` ```go @@ -5288,6 +5377,7 @@ func ResetUsername() | PemJsonInput | *string | *No description.* | | PortInput | *f64 | *No description.* | | ProtocolVersionInput | *f64 | *No description.* | +| SkipVerificationInput | interface{} | *No description.* | | TlsInput | interface{} | *No description.* | | UsernameInput | *string | *No description.* | | ConnectTimeout | *f64 | *No description.* | @@ -5298,6 +5388,7 @@ func ResetUsername() | PemJson | *string | *No description.* | | Port | *f64 | *No description.* | | ProtocolVersion | *f64 | *No description.* | +| SkipVerification | interface{} | *No description.* | | Tls | interface{} | *No description.* | | Username | *string | *No description.* | | InternalValue | DatabaseSecretBackendConnectionCassandra | *No description.* | @@ -5408,6 +5499,16 @@ func ProtocolVersionInput() *f64 --- +##### `SkipVerificationInput`Optional + +```go +func SkipVerificationInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `TlsInput`Optional ```go @@ -5508,6 +5609,16 @@ func ProtocolVersion() *f64 --- +##### `SkipVerification`Required + +```go +func SkipVerification() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Tls`Required ```go @@ -11603,7 +11714,11 @@ The attribute on the parent resource this class is referencing. | ResetMaxIdleConnections | *No description.* | | ResetMaxOpenConnections | *No description.* | | ResetPassword | *No description.* | +| ResetPrivateKey | *No description.* | +| ResetSelfManaged | *No description.* | | ResetServiceAccountJson | *No description.* | +| ResetTlsCa | *No description.* | +| ResetTlsCertificate | *No description.* | | ResetUsername | *No description.* | | ResetUsernameTemplate | *No description.* | @@ -11801,12 +11916,36 @@ func ResetMaxOpenConnections() func ResetPassword() ``` +##### `ResetPrivateKey` + +```go +func ResetPrivateKey() +``` + +##### `ResetSelfManaged` + +```go +func ResetSelfManaged() +``` + ##### `ResetServiceAccountJson` ```go func ResetServiceAccountJson() ``` +##### `ResetTlsCa` + +```go +func ResetTlsCa() +``` + +##### `ResetTlsCertificate` + +```go +func ResetTlsCertificate() +``` + ##### `ResetUsername` ```go @@ -11833,7 +11972,11 @@ func ResetUsernameTemplate() | MaxIdleConnectionsInput | *f64 | *No description.* | | MaxOpenConnectionsInput | *f64 | *No description.* | | PasswordInput | *string | *No description.* | +| PrivateKeyInput | *string | *No description.* | +| SelfManagedInput | interface{} | *No description.* | | ServiceAccountJsonInput | *string | *No description.* | +| TlsCaInput | *string | *No description.* | +| TlsCertificateInput | *string | *No description.* | | UsernameInput | *string | *No description.* | | UsernameTemplateInput | *string | *No description.* | | AuthType | *string | *No description.* | @@ -11843,7 +11986,11 @@ func ResetUsernameTemplate() | MaxIdleConnections | *f64 | *No description.* | | MaxOpenConnections | *f64 | *No description.* | | Password | *string | *No description.* | +| PrivateKey | *string | *No description.* | +| SelfManaged | interface{} | *No description.* | | ServiceAccountJson | *string | *No description.* | +| TlsCa | *string | *No description.* | +| TlsCertificate | *string | *No description.* | | Username | *string | *No description.* | | UsernameTemplate | *string | *No description.* | | InternalValue | DatabaseSecretBackendConnectionPostgresql | *No description.* | @@ -11944,6 +12091,26 @@ func PasswordInput() *string --- +##### `PrivateKeyInput`Optional + +```go +func PrivateKeyInput() *string +``` + +- *Type:* *string + +--- + +##### `SelfManagedInput`Optional + +```go +func SelfManagedInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `ServiceAccountJsonInput`Optional ```go @@ -11954,6 +12121,26 @@ func ServiceAccountJsonInput() *string --- +##### `TlsCaInput`Optional + +```go +func TlsCaInput() *string +``` + +- *Type:* *string + +--- + +##### `TlsCertificateInput`Optional + +```go +func TlsCertificateInput() *string +``` + +- *Type:* *string + +--- + ##### `UsernameInput`Optional ```go @@ -12044,6 +12231,26 @@ func Password() *string --- +##### `PrivateKey`Required + +```go +func PrivateKey() *string +``` + +- *Type:* *string + +--- + +##### `SelfManaged`Required + +```go +func SelfManaged() interface{} +``` + +- *Type:* interface{} + +--- + ##### `ServiceAccountJson`Required ```go @@ -12054,6 +12261,26 @@ func ServiceAccountJson() *string --- +##### `TlsCa`Required + +```go +func TlsCa() *string +``` + +- *Type:* *string + +--- + +##### `TlsCertificate`Required + +```go +func TlsCertificate() *string +``` + +- *Type:* *string + +--- + ##### `Username`Required ```go diff --git a/docs/databaseSecretBackendConnection.java.md b/docs/databaseSecretBackendConnection.java.md index 866642ea..a6b16702 100644 --- a/docs/databaseSecretBackendConnection.java.md +++ b/docs/databaseSecretBackendConnection.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -73,7 +73,7 @@ DatabaseSecretBackendConnection.Builder.create(Construct scope, java.lang.String | data | java.util.Map | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -161,7 +161,7 @@ Must be unique amongst siblings in the same scope Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -354,7 +354,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -364,7 +364,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -374,7 +374,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -384,7 +384,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -394,7 +394,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -404,7 +404,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -414,7 +414,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -424,7 +424,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -1260,7 +1260,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -2066,6 +2066,8 @@ DatabaseSecretBackendConnectionCassandra.builder() // .pemJson(java.lang.String) // .port(java.lang.Number) // .protocolVersion(java.lang.Number) +// .skipVerification(java.lang.Boolean) +// .skipVerification(IResolvable) // .tls(java.lang.Boolean) // .tls(IResolvable) // .username(java.lang.String) @@ -2084,6 +2086,7 @@ DatabaseSecretBackendConnectionCassandra.builder() | pemJson | java.lang.String | Specifies JSON containing a certificate and private key; | | port | java.lang.Number | The transport port to use to connect to Cassandra. | | protocolVersion | java.lang.Number | The CQL protocol version to use. | +| skipVerification | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip permissions checks when a connection to Cassandra is first created. | | tls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether to use TLS when connecting to Cassandra. | | username | java.lang.String | The username to use when authenticating with Cassandra. | @@ -2099,7 +2102,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2113,7 +2116,7 @@ public java.util.List getHosts(); Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2127,7 +2130,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2141,7 +2144,7 @@ public java.lang.String getPassword(); The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2157,7 +2160,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2173,7 +2176,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2187,7 +2190,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2201,7 +2204,23 @@ public java.lang.Number getProtocolVersion(); The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +##### `skipVerification`Optional + +```java +public java.lang.Object getSkipVerification(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -2215,7 +2234,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2229,7 +2248,7 @@ public java.lang.String getUsername(); The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2302,7 +2321,7 @@ DatabaseSecretBackendConnectionConfig.builder() | data | java.util.Map | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -2404,7 +2423,7 @@ public java.lang.String getBackend(); Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -2418,7 +2437,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -2432,7 +2451,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2446,7 +2465,7 @@ public DatabaseSecretBackendConnectionCassandra getCassandra(); cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2460,7 +2479,7 @@ public DatabaseSecretBackendConnectionCouchbase getCouchbase(); couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2474,7 +2493,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2488,7 +2507,7 @@ public DatabaseSecretBackendConnectionElasticsearch getElasticsearch(); elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2502,7 +2521,7 @@ public DatabaseSecretBackendConnectionHana getHana(); hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2514,7 +2533,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2531,7 +2550,7 @@ public DatabaseSecretBackendConnectionInfluxdb getInfluxdb(); influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2545,7 +2564,7 @@ public DatabaseSecretBackendConnectionMongodb getMongodb(); mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2559,7 +2578,7 @@ public DatabaseSecretBackendConnectionMongodbatlas getMongodbatlas(); mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2573,7 +2592,7 @@ public DatabaseSecretBackendConnectionMssql getMssql(); mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2587,7 +2606,7 @@ public DatabaseSecretBackendConnectionMysql getMysql(); mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2601,7 +2620,7 @@ public DatabaseSecretBackendConnectionMysqlAurora getMysqlAurora(); mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2615,7 +2634,7 @@ public DatabaseSecretBackendConnectionMysqlLegacy getMysqlLegacy(); mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2629,7 +2648,7 @@ public DatabaseSecretBackendConnectionMysqlRds getMysqlRds(); mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2643,7 +2662,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2657,7 +2676,7 @@ public DatabaseSecretBackendConnectionOracle getOracle(); oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2673,7 +2692,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2687,7 +2706,7 @@ public DatabaseSecretBackendConnectionPostgresql getPostgresql(); postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2701,7 +2720,7 @@ public DatabaseSecretBackendConnectionRedis getRedis(); redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2715,7 +2734,7 @@ public DatabaseSecretBackendConnectionRedisElasticache getRedisElasticache(); redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2729,7 +2748,7 @@ public DatabaseSecretBackendConnectionRedshift getRedshift(); redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2743,7 +2762,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2757,7 +2776,7 @@ public DatabaseSecretBackendConnectionSnowflake getSnowflake(); snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2771,7 +2790,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2821,7 +2840,7 @@ public java.util.List getHosts(); A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2835,7 +2854,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2849,7 +2868,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2865,7 +2884,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2879,7 +2898,7 @@ public java.lang.String getBucketName(); Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2893,7 +2912,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2907,7 +2926,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2921,7 +2940,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2974,7 +2993,7 @@ public java.lang.String getPassword(); The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2988,7 +3007,7 @@ public java.lang.String getUrl(); The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -3002,7 +3021,7 @@ public java.lang.String getUsername(); The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3016,7 +3035,7 @@ public java.lang.String getCaCert(); The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -3030,7 +3049,7 @@ public java.lang.String getCaPath(); The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -3044,7 +3063,7 @@ public java.lang.String getClientCert(); The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -3058,7 +3077,7 @@ public java.lang.String getClientKey(); The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -3072,7 +3091,7 @@ public java.lang.Object getInsecure(); Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -3086,7 +3105,7 @@ public java.lang.String getTlsServerName(); This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -3100,7 +3119,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3147,7 +3166,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3161,7 +3180,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3175,7 +3194,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3189,7 +3208,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3203,7 +3222,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3217,7 +3236,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3231,7 +3250,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3285,7 +3304,7 @@ public java.lang.String getHost(); Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -3299,7 +3318,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3313,7 +3332,7 @@ public java.lang.String getUsername(); Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3327,7 +3346,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -3341,7 +3360,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -3357,7 +3376,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -3373,7 +3392,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -3387,7 +3406,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3401,7 +3420,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3415,7 +3434,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3461,7 +3480,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3475,7 +3494,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3489,7 +3508,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3503,7 +3522,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3517,7 +3536,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3531,7 +3550,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3545,7 +3564,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3583,7 +3602,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3597,7 +3616,7 @@ public java.lang.String getProjectId(); The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3611,7 +3630,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3663,7 +3682,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3677,7 +3696,7 @@ public java.lang.Object getContainedDb(); Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3691,7 +3710,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3705,7 +3724,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3719,7 +3738,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3733,7 +3752,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3747,7 +3766,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3761,7 +3780,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3775,7 +3794,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3829,7 +3848,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3843,7 +3862,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3857,7 +3876,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3871,7 +3890,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3885,7 +3904,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3899,7 +3918,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3913,7 +3932,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3927,7 +3946,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3943,7 +3962,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3957,7 +3976,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3971,7 +3990,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4025,7 +4044,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4039,7 +4058,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4053,7 +4072,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4067,7 +4086,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4081,7 +4100,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4095,7 +4114,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4109,7 +4128,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4123,7 +4142,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4139,7 +4158,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4153,7 +4172,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4167,7 +4186,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4221,7 +4240,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4235,7 +4254,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4249,7 +4268,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4263,7 +4282,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4277,7 +4296,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4291,7 +4310,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4305,7 +4324,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4319,7 +4338,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4335,7 +4354,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4349,7 +4368,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4363,7 +4382,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4417,7 +4436,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4431,7 +4450,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4445,7 +4464,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4459,7 +4478,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4473,7 +4492,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4487,7 +4506,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4501,7 +4520,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -4515,7 +4534,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -4531,7 +4550,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -4545,7 +4564,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4559,7 +4578,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4611,7 +4630,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4625,7 +4644,7 @@ public java.lang.Object getDisconnectSessions(); Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4639,7 +4658,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4653,7 +4672,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4667,7 +4686,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4681,7 +4700,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4695,7 +4714,7 @@ public java.lang.Object getSplitStatements(); Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4709,7 +4728,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4723,7 +4742,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4743,7 +4762,12 @@ DatabaseSecretBackendConnectionPostgresql.builder() // .maxIdleConnections(java.lang.Number) // .maxOpenConnections(java.lang.Number) // .password(java.lang.String) +// .privateKey(java.lang.String) +// .selfManaged(java.lang.Boolean) +// .selfManaged(IResolvable) // .serviceAccountJson(java.lang.String) +// .tlsCa(java.lang.String) +// .tlsCertificate(java.lang.String) // .username(java.lang.String) // .usernameTemplate(java.lang.String) .build(); @@ -4760,7 +4784,11 @@ DatabaseSecretBackendConnectionPostgresql.builder() | maxIdleConnections | java.lang.Number | Maximum number of idle connections to the database. | | maxOpenConnections | java.lang.Number | Maximum number of open connections to the database. | | password | java.lang.String | The root credential password used in the connection URL. | +| privateKey | java.lang.String | The secret key used for the x509 client certificate. Must be PEM encoded. | +| selfManaged | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, allows onboarding static roles with a rootless connection configuration. | | serviceAccountJson | java.lang.String | A JSON encoded credential for use with IAM authorization. | +| tlsCa | java.lang.String | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tlsCertificate | java.lang.String | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | java.lang.String | The root credential username used in the connection URL. | | usernameTemplate | java.lang.String | Username generation template. | @@ -4776,7 +4804,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4790,7 +4818,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4804,7 +4832,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4818,7 +4846,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4832,7 +4860,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4846,7 +4874,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4860,7 +4888,35 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +##### `privateKey`Optional + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +##### `selfManaged`Optional + +```java +public java.lang.Object getSelfManaged(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -4874,7 +4930,35 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +##### `tlsCa`Optional + +```java +public java.lang.String getTlsCa(); +``` + +- *Type:* java.lang.String + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +##### `tlsCertificate`Optional + +```java +public java.lang.String getTlsCertificate(); +``` + +- *Type:* java.lang.String + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -4888,7 +4972,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4902,7 +4986,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4950,7 +5034,7 @@ public java.lang.String getHost(); Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4964,7 +5048,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4978,7 +5062,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4992,7 +5076,7 @@ public java.lang.String getCaCert(); The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -5006,7 +5090,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -5020,7 +5104,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -5034,7 +5118,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -5074,7 +5158,7 @@ public java.lang.String getUrl(); The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -5090,7 +5174,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5106,7 +5190,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -5122,7 +5206,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5171,7 +5255,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5185,7 +5269,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -5199,7 +5283,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5213,7 +5297,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5227,7 +5311,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5241,7 +5325,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5255,7 +5339,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5269,7 +5353,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5315,7 +5399,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5329,7 +5413,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5343,7 +5427,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5357,7 +5441,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5371,7 +5455,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5385,7 +5469,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5399,7 +5483,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5463,6 +5547,7 @@ The attribute on the parent resource this class is referencing. | resetPemJson | *No description.* | | resetPort | *No description.* | | resetProtocolVersion | *No description.* | +| resetSkipVerification | *No description.* | | resetTls | *No description.* | | resetUsername | *No description.* | @@ -5666,6 +5751,12 @@ public void resetPort() public void resetProtocolVersion() ``` +##### `resetSkipVerification` + +```java +public void resetSkipVerification() +``` + ##### `resetTls` ```java @@ -5693,6 +5784,7 @@ public void resetUsername() | pemJsonInput | java.lang.String | *No description.* | | portInput | java.lang.Number | *No description.* | | protocolVersionInput | java.lang.Number | *No description.* | +| skipVerificationInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | tlsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | usernameInput | java.lang.String | *No description.* | | connectTimeout | java.lang.Number | *No description.* | @@ -5703,6 +5795,7 @@ public void resetUsername() | pemJson | java.lang.String | *No description.* | | port | java.lang.Number | *No description.* | | protocolVersion | java.lang.Number | *No description.* | +| skipVerification | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | tls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | username | java.lang.String | *No description.* | | internalValue | DatabaseSecretBackendConnectionCassandra | *No description.* | @@ -5813,6 +5906,16 @@ public java.lang.Number getProtocolVersionInput(); --- +##### `skipVerificationInput`Optional + +```java +public java.lang.Object getSkipVerificationInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `tlsInput`Optional ```java @@ -5913,6 +6016,16 @@ public java.lang.Number getProtocolVersion(); --- +##### `skipVerification`Required + +```java +public java.lang.Object getSkipVerification(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `tls`Required ```java @@ -12008,7 +12121,11 @@ The attribute on the parent resource this class is referencing. | resetMaxIdleConnections | *No description.* | | resetMaxOpenConnections | *No description.* | | resetPassword | *No description.* | +| resetPrivateKey | *No description.* | +| resetSelfManaged | *No description.* | | resetServiceAccountJson | *No description.* | +| resetTlsCa | *No description.* | +| resetTlsCertificate | *No description.* | | resetUsername | *No description.* | | resetUsernameTemplate | *No description.* | @@ -12206,12 +12323,36 @@ public void resetMaxOpenConnections() public void resetPassword() ``` +##### `resetPrivateKey` + +```java +public void resetPrivateKey() +``` + +##### `resetSelfManaged` + +```java +public void resetSelfManaged() +``` + ##### `resetServiceAccountJson` ```java public void resetServiceAccountJson() ``` +##### `resetTlsCa` + +```java +public void resetTlsCa() +``` + +##### `resetTlsCertificate` + +```java +public void resetTlsCertificate() +``` + ##### `resetUsername` ```java @@ -12238,7 +12379,11 @@ public void resetUsernameTemplate() | maxIdleConnectionsInput | java.lang.Number | *No description.* | | maxOpenConnectionsInput | java.lang.Number | *No description.* | | passwordInput | java.lang.String | *No description.* | +| privateKeyInput | java.lang.String | *No description.* | +| selfManagedInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | serviceAccountJsonInput | java.lang.String | *No description.* | +| tlsCaInput | java.lang.String | *No description.* | +| tlsCertificateInput | java.lang.String | *No description.* | | usernameInput | java.lang.String | *No description.* | | usernameTemplateInput | java.lang.String | *No description.* | | authType | java.lang.String | *No description.* | @@ -12248,7 +12393,11 @@ public void resetUsernameTemplate() | maxIdleConnections | java.lang.Number | *No description.* | | maxOpenConnections | java.lang.Number | *No description.* | | password | java.lang.String | *No description.* | +| privateKey | java.lang.String | *No description.* | +| selfManaged | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | serviceAccountJson | java.lang.String | *No description.* | +| tlsCa | java.lang.String | *No description.* | +| tlsCertificate | java.lang.String | *No description.* | | username | java.lang.String | *No description.* | | usernameTemplate | java.lang.String | *No description.* | | internalValue | DatabaseSecretBackendConnectionPostgresql | *No description.* | @@ -12349,6 +12498,26 @@ public java.lang.String getPasswordInput(); --- +##### `privateKeyInput`Optional + +```java +public java.lang.String getPrivateKeyInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `selfManagedInput`Optional + +```java +public java.lang.Object getSelfManagedInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `serviceAccountJsonInput`Optional ```java @@ -12359,6 +12528,26 @@ public java.lang.String getServiceAccountJsonInput(); --- +##### `tlsCaInput`Optional + +```java +public java.lang.String getTlsCaInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `tlsCertificateInput`Optional + +```java +public java.lang.String getTlsCertificateInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `usernameInput`Optional ```java @@ -12449,6 +12638,26 @@ public java.lang.String getPassword(); --- +##### `privateKey`Required + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +--- + +##### `selfManaged`Required + +```java +public java.lang.Object getSelfManaged(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `serviceAccountJson`Required ```java @@ -12459,6 +12668,26 @@ public java.lang.String getServiceAccountJson(); --- +##### `tlsCa`Required + +```java +public java.lang.String getTlsCa(); +``` + +- *Type:* java.lang.String + +--- + +##### `tlsCertificate`Required + +```java +public java.lang.String getTlsCertificate(); +``` + +- *Type:* java.lang.String + +--- + ##### `username`Required ```java diff --git a/docs/databaseSecretBackendConnection.python.md b/docs/databaseSecretBackendConnection.python.md index bba6ae1f..f154b148 100644 --- a/docs/databaseSecretBackendConnection.python.md +++ b/docs/databaseSecretBackendConnection.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -70,7 +70,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnection( | data | typing.Mapping[str] | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -158,7 +158,7 @@ Must be unique amongst siblings in the same scope Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -249,7 +249,7 @@ If you experience problems setting this value it might not be settable. Please t influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -351,7 +351,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -361,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -371,7 +371,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -381,7 +381,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -391,7 +391,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -401,7 +401,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -411,7 +411,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -421,7 +421,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -835,6 +835,7 @@ def put_cassandra( pem_json: str = None, port: typing.Union[int, float] = None, protocol_version: typing.Union[int, float] = None, + skip_verification: typing.Union[bool, IResolvable] = None, tls: typing.Union[bool, IResolvable] = None, username: str = None ) -> None @@ -846,7 +847,7 @@ def put_cassandra( The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -856,7 +857,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -866,7 +867,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -876,7 +877,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -888,7 +889,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -900,7 +901,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -910,7 +911,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -920,7 +921,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +###### `skip_verification`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -930,7 +943,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -940,7 +953,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -965,7 +978,7 @@ def put_couchbase( A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -975,7 +988,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -985,7 +998,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -997,7 +1010,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -1007,7 +1020,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -1017,7 +1030,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1027,7 +1040,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1037,7 +1050,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1064,7 +1077,7 @@ def put_elasticsearch( The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1074,7 +1087,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -1084,7 +1097,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1094,7 +1107,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -1104,7 +1117,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -1114,7 +1127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -1124,7 +1137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -1134,7 +1147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -1144,7 +1157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -1154,7 +1167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1178,7 +1191,7 @@ def put_hana( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1188,7 +1201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -1198,7 +1211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1208,7 +1221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1218,7 +1231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1228,7 +1241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1238,7 +1251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1265,7 +1278,7 @@ def put_influxdb( Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -1275,7 +1288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1285,7 +1298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1295,7 +1308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1305,7 +1318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1317,7 +1330,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1329,7 +1342,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1339,7 +1352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1349,7 +1362,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1359,7 +1372,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1383,7 +1396,7 @@ def put_mongodb( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1393,7 +1406,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1403,7 +1416,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1413,7 +1426,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1423,7 +1436,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1433,7 +1446,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1443,7 +1456,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1463,7 +1476,7 @@ def put_mongodbatlas( The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -1473,7 +1486,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -1483,7 +1496,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -1509,7 +1522,7 @@ def put_mssql( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1519,7 +1532,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -1529,7 +1542,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -1539,7 +1552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1549,7 +1562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1559,7 +1572,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1569,7 +1582,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1579,7 +1592,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1589,7 +1602,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1617,7 +1630,7 @@ def put_mysql( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1627,7 +1640,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1637,7 +1650,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1647,7 +1660,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1657,7 +1670,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1667,7 +1680,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1677,7 +1690,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1687,7 +1700,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1699,7 +1712,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1709,7 +1722,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1719,7 +1732,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1747,7 +1760,7 @@ def put_mysql_aurora( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1757,7 +1770,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1767,7 +1780,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1777,7 +1790,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1787,7 +1800,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1797,7 +1810,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1807,7 +1820,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1817,7 +1830,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1829,7 +1842,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1839,7 +1852,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1849,7 +1862,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -1877,7 +1890,7 @@ def put_mysql_legacy( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -1887,7 +1900,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -1897,7 +1910,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -1907,7 +1920,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -1917,7 +1930,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -1927,7 +1940,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1937,7 +1950,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -1947,7 +1960,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -1959,7 +1972,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -1969,7 +1982,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1979,7 +1992,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2007,7 +2020,7 @@ def put_mysql_rds( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -2017,7 +2030,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2027,7 +2040,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2037,7 +2050,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2047,7 +2060,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2057,7 +2070,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2067,7 +2080,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -2077,7 +2090,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -2089,7 +2102,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -2099,7 +2112,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2109,7 +2122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2135,7 +2148,7 @@ def put_oracle( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2145,7 +2158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -2155,7 +2168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2165,7 +2178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2175,7 +2188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2185,7 +2198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2195,7 +2208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -2205,7 +2218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2215,7 +2228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2230,7 +2243,11 @@ def put_postgresql( max_idle_connections: typing.Union[int, float] = None, max_open_connections: typing.Union[int, float] = None, password: str = None, + private_key: str = None, + self_managed: typing.Union[bool, IResolvable] = None, service_account_json: str = None, + tls_ca: str = None, + tls_certificate: str = None, username: str = None, username_template: str = None ) -> None @@ -2242,7 +2259,7 @@ def put_postgresql( Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -2252,7 +2269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2262,7 +2279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2272,7 +2289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2282,7 +2299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2292,7 +2309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2302,7 +2319,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +###### `private_key`Optional + +- *Type:* str + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +###### `self_managed`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -2312,7 +2349,27 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +###### `tls_ca`Optional + +- *Type:* str + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +###### `tls_certificate`Optional + +- *Type:* str + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -2322,7 +2379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2332,7 +2389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2356,7 +2413,7 @@ def put_redis( Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2366,7 +2423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2376,7 +2433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2386,7 +2443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2396,7 +2453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2406,7 +2463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2416,7 +2473,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2437,7 +2494,7 @@ def put_redis_elasticache( The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2449,7 +2506,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2461,7 +2518,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -2473,7 +2530,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2498,7 +2555,7 @@ def put_redshift( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2508,7 +2565,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2518,7 +2575,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2528,7 +2585,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2538,7 +2595,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2548,7 +2605,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2558,7 +2615,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2568,7 +2625,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2592,7 +2649,7 @@ def put_snowflake( Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2602,7 +2659,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2612,7 +2669,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2622,7 +2679,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2632,7 +2689,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2642,7 +2699,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2652,7 +2709,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2920,7 +2977,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -3725,6 +3782,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra( pem_json: str = None, port: typing.Union[int, float] = None, protocol_version: typing.Union[int, float] = None, + skip_verification: typing.Union[bool, IResolvable] = None, tls: typing.Union[bool, IResolvable] = None, username: str = None ) @@ -3742,6 +3800,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionCassandra( | pem_json | str | Specifies JSON containing a certificate and private key; | | port | typing.Union[int, float] | The transport port to use to connect to Cassandra. | | protocol_version | typing.Union[int, float] | The CQL protocol version to use. | +| skip_verification | typing.Union[bool, cdktf.IResolvable] | Skip permissions checks when a connection to Cassandra is first created. | | tls | typing.Union[bool, cdktf.IResolvable] | Whether to use TLS when connecting to Cassandra. | | username | str | The username to use when authenticating with Cassandra. | @@ -3757,7 +3816,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -3771,7 +3830,7 @@ hosts: typing.List[str] Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -3785,7 +3844,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -3799,7 +3858,7 @@ password: str The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3815,7 +3874,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -3831,7 +3890,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -3845,7 +3904,7 @@ port: typing.Union[int, float] The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -3859,7 +3918,23 @@ protocol_version: typing.Union[int, float] The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +##### `skip_verification`Optional + +```python +skip_verification: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -3873,7 +3948,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -3887,7 +3962,7 @@ username: str The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3955,7 +4030,7 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionConfig( | data | typing.Mapping[str] | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -4057,7 +4132,7 @@ backend: str Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -4071,7 +4146,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -4085,7 +4160,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -4099,7 +4174,7 @@ cassandra: DatabaseSecretBackendConnectionCassandra cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -4113,7 +4188,7 @@ couchbase: DatabaseSecretBackendConnectionCouchbase couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -4127,7 +4202,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -4141,7 +4216,7 @@ elasticsearch: DatabaseSecretBackendConnectionElasticsearch elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -4155,7 +4230,7 @@ hana: DatabaseSecretBackendConnectionHana hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -4167,7 +4242,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -4184,7 +4259,7 @@ influxdb: DatabaseSecretBackendConnectionInfluxdb influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -4198,7 +4273,7 @@ mongodb: DatabaseSecretBackendConnectionMongodb mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -4212,7 +4287,7 @@ mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -4226,7 +4301,7 @@ mssql: DatabaseSecretBackendConnectionMssql mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -4240,7 +4315,7 @@ mysql: DatabaseSecretBackendConnectionMysql mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -4254,7 +4329,7 @@ mysql_aurora: DatabaseSecretBackendConnectionMysqlAurora mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -4268,7 +4343,7 @@ mysql_legacy: DatabaseSecretBackendConnectionMysqlLegacy mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -4282,7 +4357,7 @@ mysql_rds: DatabaseSecretBackendConnectionMysqlRds mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -4296,7 +4371,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -4310,7 +4385,7 @@ oracle: DatabaseSecretBackendConnectionOracle oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -4326,7 +4401,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -4340,7 +4415,7 @@ postgresql: DatabaseSecretBackendConnectionPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -4354,7 +4429,7 @@ redis: DatabaseSecretBackendConnectionRedis redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -4368,7 +4443,7 @@ redis_elasticache: DatabaseSecretBackendConnectionRedisElasticache redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -4382,7 +4457,7 @@ redshift: DatabaseSecretBackendConnectionRedshift redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -4396,7 +4471,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -4410,7 +4485,7 @@ snowflake: DatabaseSecretBackendConnectionSnowflake snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -4424,7 +4499,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -4472,7 +4547,7 @@ hosts: typing.List[str] A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -4486,7 +4561,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4500,7 +4575,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4516,7 +4591,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -4530,7 +4605,7 @@ bucket_name: str Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -4544,7 +4619,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4558,7 +4633,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4572,7 +4647,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4624,7 +4699,7 @@ password: str The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4638,7 +4713,7 @@ url: str The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4652,7 +4727,7 @@ username: str The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4666,7 +4741,7 @@ ca_cert: str The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4680,7 +4755,7 @@ ca_path: str The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -4694,7 +4769,7 @@ client_cert: str The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -4708,7 +4783,7 @@ client_key: str The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -4722,7 +4797,7 @@ insecure: typing.Union[bool, IResolvable] Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -4736,7 +4811,7 @@ tls_server_name: str This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -4750,7 +4825,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4796,7 +4871,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4810,7 +4885,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4824,7 +4899,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4838,7 +4913,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4852,7 +4927,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4866,7 +4941,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4880,7 +4955,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4932,7 +5007,7 @@ host: str Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4946,7 +5021,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4960,7 +5035,7 @@ username: str Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4974,7 +5049,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -4988,7 +5063,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -5004,7 +5079,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -5020,7 +5095,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -5034,7 +5109,7 @@ port: typing.Union[int, float] The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -5048,7 +5123,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -5062,7 +5137,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5108,7 +5183,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5122,7 +5197,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5136,7 +5211,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5150,7 +5225,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5164,7 +5239,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5178,7 +5253,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5192,7 +5267,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5230,7 +5305,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -5244,7 +5319,7 @@ project_id: str The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -5258,7 +5333,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -5308,7 +5383,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5322,7 +5397,7 @@ contained_db: typing.Union[bool, IResolvable] Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -5336,7 +5411,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -5350,7 +5425,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5364,7 +5439,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5378,7 +5453,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5392,7 +5467,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5406,7 +5481,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5420,7 +5495,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5474,7 +5549,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5488,7 +5563,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5502,7 +5577,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5516,7 +5591,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5530,7 +5605,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5544,7 +5619,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5558,7 +5633,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5572,7 +5647,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5588,7 +5663,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5602,7 +5677,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5616,7 +5691,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5670,7 +5745,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5684,7 +5759,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5698,7 +5773,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5712,7 +5787,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5726,7 +5801,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5740,7 +5815,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5754,7 +5829,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5768,7 +5843,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5784,7 +5859,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5798,7 +5873,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -5812,7 +5887,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -5866,7 +5941,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -5880,7 +5955,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -5894,7 +5969,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -5908,7 +5983,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -5922,7 +5997,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -5936,7 +6011,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -5950,7 +6025,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -5964,7 +6039,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -5980,7 +6055,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -5994,7 +6069,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6008,7 +6083,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6062,7 +6137,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -6076,7 +6151,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6090,7 +6165,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6104,7 +6179,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6118,7 +6193,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6132,7 +6207,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6146,7 +6221,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -6160,7 +6235,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -6176,7 +6251,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -6190,7 +6265,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6204,7 +6279,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6254,7 +6329,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6268,7 +6343,7 @@ disconnect_sessions: typing.Union[bool, IResolvable] Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -6282,7 +6357,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6296,7 +6371,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6310,7 +6385,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6324,7 +6399,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6338,7 +6413,7 @@ split_statements: typing.Union[bool, IResolvable] Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -6352,7 +6427,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6366,7 +6441,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6385,7 +6460,11 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql( max_idle_connections: typing.Union[int, float] = None, max_open_connections: typing.Union[int, float] = None, password: str = None, + private_key: str = None, + self_managed: typing.Union[bool, IResolvable] = None, service_account_json: str = None, + tls_ca: str = None, + tls_certificate: str = None, username: str = None, username_template: str = None ) @@ -6402,7 +6481,11 @@ databaseSecretBackendConnection.DatabaseSecretBackendConnectionPostgresql( | max_idle_connections | typing.Union[int, float] | Maximum number of idle connections to the database. | | max_open_connections | typing.Union[int, float] | Maximum number of open connections to the database. | | password | str | The root credential password used in the connection URL. | +| private_key | str | The secret key used for the x509 client certificate. Must be PEM encoded. | +| self_managed | typing.Union[bool, cdktf.IResolvable] | If set, allows onboarding static roles with a rootless connection configuration. | | service_account_json | str | A JSON encoded credential for use with IAM authorization. | +| tls_ca | str | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tls_certificate | str | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | str | The root credential username used in the connection URL. | | username_template | str | Username generation template. | @@ -6418,7 +6501,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -6432,7 +6515,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6446,7 +6529,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -6460,7 +6543,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6474,7 +6557,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6488,7 +6571,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6502,7 +6585,35 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +##### `private_key`Optional + +```python +private_key: str +``` + +- *Type:* str + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +##### `self_managed`Optional + +```python +self_managed: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -6516,7 +6627,35 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +##### `tls_ca`Optional + +```python +tls_ca: str +``` + +- *Type:* str + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +##### `tls_certificate`Optional + +```python +tls_certificate: str +``` + +- *Type:* str + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -6530,7 +6669,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6544,7 +6683,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6590,7 +6729,7 @@ host: str Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -6604,7 +6743,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6618,7 +6757,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6632,7 +6771,7 @@ ca_cert: str The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -6646,7 +6785,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -6660,7 +6799,7 @@ port: typing.Union[int, float] The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -6674,7 +6813,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -6714,7 +6853,7 @@ url: str The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -6730,7 +6869,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6746,7 +6885,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -6762,7 +6901,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6810,7 +6949,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6824,7 +6963,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -6838,7 +6977,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6852,7 +6991,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6866,7 +7005,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -6880,7 +7019,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -6894,7 +7033,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -6908,7 +7047,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -6954,7 +7093,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -6968,7 +7107,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -6982,7 +7121,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -6996,7 +7135,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -7010,7 +7149,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -7024,7 +7163,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -7038,7 +7177,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -7105,6 +7244,7 @@ The attribute on the parent resource this class is referencing. | reset_pem_json | *No description.* | | reset_port | *No description.* | | reset_protocol_version | *No description.* | +| reset_skip_verification | *No description.* | | reset_tls | *No description.* | | reset_username | *No description.* | @@ -7330,6 +7470,12 @@ def reset_port() -> None def reset_protocol_version() -> None ``` +##### `reset_skip_verification` + +```python +def reset_skip_verification() -> None +``` + ##### `reset_tls` ```python @@ -7357,6 +7503,7 @@ def reset_username() -> None | pem_json_input | str | *No description.* | | port_input | typing.Union[int, float] | *No description.* | | protocol_version_input | typing.Union[int, float] | *No description.* | +| skip_verification_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | tls_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username_input | str | *No description.* | | connect_timeout | typing.Union[int, float] | *No description.* | @@ -7367,6 +7514,7 @@ def reset_username() -> None | pem_json | str | *No description.* | | port | typing.Union[int, float] | *No description.* | | protocol_version | typing.Union[int, float] | *No description.* | +| skip_verification | typing.Union[bool, cdktf.IResolvable] | *No description.* | | tls | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username | str | *No description.* | | internal_value | DatabaseSecretBackendConnectionCassandra | *No description.* | @@ -7477,6 +7625,16 @@ protocol_version_input: typing.Union[int, float] --- +##### `skip_verification_input`Optional + +```python +skip_verification_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `tls_input`Optional ```python @@ -7577,6 +7735,16 @@ protocol_version: typing.Union[int, float] --- +##### `skip_verification`Required + +```python +skip_verification: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `tls`Required ```python @@ -13975,7 +14143,11 @@ The attribute on the parent resource this class is referencing. | reset_max_idle_connections | *No description.* | | reset_max_open_connections | *No description.* | | reset_password | *No description.* | +| reset_private_key | *No description.* | +| reset_self_managed | *No description.* | | reset_service_account_json | *No description.* | +| reset_tls_ca | *No description.* | +| reset_tls_certificate | *No description.* | | reset_username | *No description.* | | reset_username_template | *No description.* | @@ -14195,12 +14367,36 @@ def reset_max_open_connections() -> None def reset_password() -> None ``` +##### `reset_private_key` + +```python +def reset_private_key() -> None +``` + +##### `reset_self_managed` + +```python +def reset_self_managed() -> None +``` + ##### `reset_service_account_json` ```python def reset_service_account_json() -> None ``` +##### `reset_tls_ca` + +```python +def reset_tls_ca() -> None +``` + +##### `reset_tls_certificate` + +```python +def reset_tls_certificate() -> None +``` + ##### `reset_username` ```python @@ -14227,7 +14423,11 @@ def reset_username_template() -> None | max_idle_connections_input | typing.Union[int, float] | *No description.* | | max_open_connections_input | typing.Union[int, float] | *No description.* | | password_input | str | *No description.* | +| private_key_input | str | *No description.* | +| self_managed_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | service_account_json_input | str | *No description.* | +| tls_ca_input | str | *No description.* | +| tls_certificate_input | str | *No description.* | | username_input | str | *No description.* | | username_template_input | str | *No description.* | | auth_type | str | *No description.* | @@ -14237,7 +14437,11 @@ def reset_username_template() -> None | max_idle_connections | typing.Union[int, float] | *No description.* | | max_open_connections | typing.Union[int, float] | *No description.* | | password | str | *No description.* | +| private_key | str | *No description.* | +| self_managed | typing.Union[bool, cdktf.IResolvable] | *No description.* | | service_account_json | str | *No description.* | +| tls_ca | str | *No description.* | +| tls_certificate | str | *No description.* | | username | str | *No description.* | | username_template | str | *No description.* | | internal_value | DatabaseSecretBackendConnectionPostgresql | *No description.* | @@ -14338,6 +14542,26 @@ password_input: str --- +##### `private_key_input`Optional + +```python +private_key_input: str +``` + +- *Type:* str + +--- + +##### `self_managed_input`Optional + +```python +self_managed_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `service_account_json_input`Optional ```python @@ -14348,6 +14572,26 @@ service_account_json_input: str --- +##### `tls_ca_input`Optional + +```python +tls_ca_input: str +``` + +- *Type:* str + +--- + +##### `tls_certificate_input`Optional + +```python +tls_certificate_input: str +``` + +- *Type:* str + +--- + ##### `username_input`Optional ```python @@ -14438,6 +14682,26 @@ password: str --- +##### `private_key`Required + +```python +private_key: str +``` + +- *Type:* str + +--- + +##### `self_managed`Required + +```python +self_managed: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `service_account_json`Required ```python @@ -14448,6 +14712,26 @@ service_account_json: str --- +##### `tls_ca`Required + +```python +tls_ca: str +``` + +- *Type:* str + +--- + +##### `tls_certificate`Required + +```python +tls_certificate: str +``` + +- *Type:* str + +--- + ##### `username`Required ```python diff --git a/docs/databaseSecretBackendConnection.typescript.md b/docs/databaseSecretBackendConnection.typescript.md index 6c3580ad..7a41e3dd 100644 --- a/docs/databaseSecretBackendConnection.typescript.md +++ b/docs/databaseSecretBackendConnection.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendConnection -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection vault_database_secret_backend_connection}. #### Initializers @@ -876,7 +876,7 @@ The construct id used in the generated config for the DatabaseSecretBackendConne The id of the existing DatabaseSecretBackendConnection that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#import import section} in the documentation of this resource for the id to use --- @@ -1687,6 +1687,7 @@ const databaseSecretBackendConnectionCassandra: databaseSecretBackendConnection. | pemJson | string | Specifies JSON containing a certificate and private key; | | port | number | The transport port to use to connect to Cassandra. | | protocolVersion | number | The CQL protocol version to use. | +| skipVerification | boolean \| cdktf.IResolvable | Skip permissions checks when a connection to Cassandra is first created. | | tls | boolean \| cdktf.IResolvable | Whether to use TLS when connecting to Cassandra. | | username | string | The username to use when authenticating with Cassandra. | @@ -1702,7 +1703,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -1716,7 +1717,7 @@ public readonly hosts: string[]; Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -1730,7 +1731,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -1744,7 +1745,7 @@ public readonly password: string; The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -1760,7 +1761,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -1776,7 +1777,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -1790,7 +1791,7 @@ public readonly port: number; The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -1804,7 +1805,23 @@ public readonly protocolVersion: number; The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#protocol_version DatabaseSecretBackendConnection#protocol_version} + +--- + +##### `skipVerification`Optional + +```typescript +public readonly skipVerification: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#skip_verification DatabaseSecretBackendConnection#skip_verification} --- @@ -1818,7 +1835,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -1832,7 +1849,7 @@ public readonly username: string; The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -1865,7 +1882,7 @@ const databaseSecretBackendConnectionConfig: databaseSecretBackendConnection.Dat | data | {[ key: string ]: string} | A map of sensitive data to pass to the endpoint. Useful for templated connection strings. | | elasticsearch | DatabaseSecretBackendConnectionElasticsearch | elasticsearch block. | | hana | DatabaseSecretBackendConnectionHana | hana block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. | | influxdb | DatabaseSecretBackendConnectionInfluxdb | influxdb block. | | mongodb | DatabaseSecretBackendConnectionMongodb | mongodb block. | | mongodbatlas | DatabaseSecretBackendConnectionMongodbatlas | mongodbatlas block. | @@ -1967,7 +1984,7 @@ public readonly backend: string; Unique name of the Vault mount to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#backend DatabaseSecretBackendConnection#backend} --- @@ -1981,7 +1998,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#name DatabaseSecretBackendConnection#name} --- @@ -1995,7 +2012,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#allowed_roles DatabaseSecretBackendConnection#allowed_roles} --- @@ -2009,7 +2026,7 @@ public readonly cassandra: DatabaseSecretBackendConnectionCassandra; cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#cassandra DatabaseSecretBackendConnection#cassandra} --- @@ -2023,7 +2040,7 @@ public readonly couchbase: DatabaseSecretBackendConnectionCouchbase; couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#couchbase DatabaseSecretBackendConnection#couchbase} --- @@ -2037,7 +2054,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#data DatabaseSecretBackendConnection#data} --- @@ -2051,7 +2068,7 @@ public readonly elasticsearch: DatabaseSecretBackendConnectionElasticsearch; elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#elasticsearch DatabaseSecretBackendConnection#elasticsearch} --- @@ -2065,7 +2082,7 @@ public readonly hana: DatabaseSecretBackendConnectionHana; hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hana DatabaseSecretBackendConnection#hana} --- @@ -2077,7 +2094,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#id DatabaseSecretBackendConnection#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2094,7 +2111,7 @@ public readonly influxdb: DatabaseSecretBackendConnectionInfluxdb; influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#influxdb DatabaseSecretBackendConnection#influxdb} --- @@ -2108,7 +2125,7 @@ public readonly mongodb: DatabaseSecretBackendConnectionMongodb; mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodb DatabaseSecretBackendConnection#mongodb} --- @@ -2122,7 +2139,7 @@ public readonly mongodbatlas: DatabaseSecretBackendConnectionMongodbatlas; mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mongodbatlas DatabaseSecretBackendConnection#mongodbatlas} --- @@ -2136,7 +2153,7 @@ public readonly mssql: DatabaseSecretBackendConnectionMssql; mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mssql DatabaseSecretBackendConnection#mssql} --- @@ -2150,7 +2167,7 @@ public readonly mysql: DatabaseSecretBackendConnectionMysql; mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql DatabaseSecretBackendConnection#mysql} --- @@ -2164,7 +2181,7 @@ public readonly mysqlAurora: DatabaseSecretBackendConnectionMysqlAurora; mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_aurora DatabaseSecretBackendConnection#mysql_aurora} --- @@ -2178,7 +2195,7 @@ public readonly mysqlLegacy: DatabaseSecretBackendConnectionMysqlLegacy; mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_legacy DatabaseSecretBackendConnection#mysql_legacy} --- @@ -2192,7 +2209,7 @@ public readonly mysqlRds: DatabaseSecretBackendConnectionMysqlRds; mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#mysql_rds DatabaseSecretBackendConnection#mysql_rds} --- @@ -2206,7 +2223,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#namespace DatabaseSecretBackendConnection#namespace} --- @@ -2220,7 +2237,7 @@ public readonly oracle: DatabaseSecretBackendConnectionOracle; oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#oracle DatabaseSecretBackendConnection#oracle} --- @@ -2236,7 +2253,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#plugin_name DatabaseSecretBackendConnection#plugin_name} --- @@ -2250,7 +2267,7 @@ public readonly postgresql: DatabaseSecretBackendConnectionPostgresql; postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#postgresql DatabaseSecretBackendConnection#postgresql} --- @@ -2264,7 +2281,7 @@ public readonly redis: DatabaseSecretBackendConnectionRedis; redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis DatabaseSecretBackendConnection#redis} --- @@ -2278,7 +2295,7 @@ public readonly redisElasticache: DatabaseSecretBackendConnectionRedisElasticach redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redis_elasticache DatabaseSecretBackendConnection#redis_elasticache} --- @@ -2292,7 +2309,7 @@ public readonly redshift: DatabaseSecretBackendConnectionRedshift; redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#redshift DatabaseSecretBackendConnection#redshift} --- @@ -2306,7 +2323,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#root_rotation_statements DatabaseSecretBackendConnection#root_rotation_statements} --- @@ -2320,7 +2337,7 @@ public readonly snowflake: DatabaseSecretBackendConnectionSnowflake; snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#snowflake DatabaseSecretBackendConnection#snowflake} --- @@ -2334,7 +2351,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#verify_connection DatabaseSecretBackendConnection#verify_connection} --- @@ -2373,7 +2390,7 @@ public readonly hosts: string[]; A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#hosts DatabaseSecretBackendConnection#hosts} --- @@ -2387,7 +2404,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2401,7 +2418,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2417,7 +2434,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#base64_pem DatabaseSecretBackendConnection#base64_pem} --- @@ -2431,7 +2448,7 @@ public readonly bucketName: string; Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#bucket_name DatabaseSecretBackendConnection#bucket_name} --- @@ -2445,7 +2462,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2459,7 +2476,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2473,7 +2490,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2514,7 +2531,7 @@ public readonly password: string; The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2528,7 +2545,7 @@ public readonly url: string; The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -2542,7 +2559,7 @@ public readonly username: string; The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2556,7 +2573,7 @@ public readonly caCert: string; The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -2570,7 +2587,7 @@ public readonly caPath: string; The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_path DatabaseSecretBackendConnection#ca_path} --- @@ -2584,7 +2601,7 @@ public readonly clientCert: string; The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_cert DatabaseSecretBackendConnection#client_cert} --- @@ -2598,7 +2615,7 @@ public readonly clientKey: string; The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#client_key DatabaseSecretBackendConnection#client_key} --- @@ -2612,7 +2629,7 @@ public readonly insecure: boolean | IResolvable; Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure DatabaseSecretBackendConnection#insecure} --- @@ -2626,7 +2643,7 @@ public readonly tlsServerName: string; This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_server_name DatabaseSecretBackendConnection#tls_server_name} --- @@ -2640,7 +2657,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2678,7 +2695,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2692,7 +2709,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -2706,7 +2723,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2720,7 +2737,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -2734,7 +2751,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -2748,7 +2765,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2762,7 +2779,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2803,7 +2820,7 @@ public readonly host: string; Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -2817,7 +2834,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -2831,7 +2848,7 @@ public readonly username: string; Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -2845,7 +2862,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connect_timeout DatabaseSecretBackendConnection#connect_timeout} --- @@ -2859,7 +2876,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -2875,7 +2892,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_bundle DatabaseSecretBackendConnection#pem_bundle} --- @@ -2891,7 +2908,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#pem_json DatabaseSecretBackendConnection#pem_json} --- @@ -2905,7 +2922,7 @@ public readonly port: number; The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -2919,7 +2936,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -2933,7 +2950,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -2971,7 +2988,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -2985,7 +3002,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -2999,7 +3016,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3013,7 +3030,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3027,7 +3044,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3041,7 +3058,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3055,7 +3072,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3089,7 +3106,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} --- @@ -3103,7 +3120,7 @@ public readonly projectId: string; The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#project_id DatabaseSecretBackendConnection#project_id} --- @@ -3117,7 +3134,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#public_key DatabaseSecretBackendConnection#public_key} --- @@ -3157,7 +3174,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3171,7 +3188,7 @@ public readonly containedDb: boolean | IResolvable; Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#contained_db DatabaseSecretBackendConnection#contained_db} --- @@ -3185,7 +3202,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -3199,7 +3216,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3213,7 +3230,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3227,7 +3244,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3241,7 +3258,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3255,7 +3272,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3269,7 +3286,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3311,7 +3328,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3325,7 +3342,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3339,7 +3356,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3353,7 +3370,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3367,7 +3384,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3381,7 +3398,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3395,7 +3412,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3409,7 +3426,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3425,7 +3442,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3439,7 +3456,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3453,7 +3470,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3495,7 +3512,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3509,7 +3526,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3523,7 +3540,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3537,7 +3554,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3551,7 +3568,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3565,7 +3582,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3579,7 +3596,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3593,7 +3610,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3609,7 +3626,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3623,7 +3640,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3637,7 +3654,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3679,7 +3696,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3693,7 +3710,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3707,7 +3724,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3721,7 +3738,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3735,7 +3752,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3749,7 +3766,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3763,7 +3780,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3777,7 +3794,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3793,7 +3810,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3807,7 +3824,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -3821,7 +3838,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -3863,7 +3880,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -3877,7 +3894,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -3891,7 +3908,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -3905,7 +3922,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -3919,7 +3936,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -3933,7 +3950,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -3947,7 +3964,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} --- @@ -3961,7 +3978,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} --- @@ -3977,7 +3994,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate_key DatabaseSecretBackendConnection#tls_certificate_key} --- @@ -3991,7 +4008,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4005,7 +4022,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4045,7 +4062,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4059,7 +4076,7 @@ public readonly disconnectSessions: boolean | IResolvable; Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disconnect_sessions DatabaseSecretBackendConnection#disconnect_sessions} --- @@ -4073,7 +4090,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4087,7 +4104,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4101,7 +4118,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4115,7 +4132,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4129,7 +4146,7 @@ public readonly splitStatements: boolean | IResolvable; Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#split_statements DatabaseSecretBackendConnection#split_statements} --- @@ -4143,7 +4160,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4157,7 +4174,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4182,7 +4199,11 @@ const databaseSecretBackendConnectionPostgresql: databaseSecretBackendConnection | maxIdleConnections | number | Maximum number of idle connections to the database. | | maxOpenConnections | number | Maximum number of open connections to the database. | | password | string | The root credential password used in the connection URL. | +| privateKey | string | The secret key used for the x509 client certificate. Must be PEM encoded. | +| selfManaged | boolean \| cdktf.IResolvable | If set, allows onboarding static roles with a rootless connection configuration. | | serviceAccountJson | string | A JSON encoded credential for use with IAM authorization. | +| tlsCa | string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tlsCertificate | string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | string | The root credential username used in the connection URL. | | usernameTemplate | string | Username generation template. | @@ -4198,7 +4219,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#auth_type DatabaseSecretBackendConnection#auth_type} --- @@ -4212,7 +4233,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4226,7 +4247,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4240,7 +4261,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4254,7 +4275,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4268,7 +4289,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4282,7 +4303,35 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} + +--- + +##### `privateKey`Optional + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#private_key DatabaseSecretBackendConnection#private_key} + +--- + +##### `selfManaged`Optional + +```typescript +public readonly selfManaged: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#self_managed DatabaseSecretBackendConnection#self_managed} --- @@ -4296,7 +4345,35 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#service_account_json DatabaseSecretBackendConnection#service_account_json} + +--- + +##### `tlsCa`Optional + +```typescript +public readonly tlsCa: string; +``` + +- *Type:* string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_ca DatabaseSecretBackendConnection#tls_ca} + +--- + +##### `tlsCertificate`Optional + +```typescript +public readonly tlsCertificate: string; +``` + +- *Type:* string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls_certificate DatabaseSecretBackendConnection#tls_certificate} --- @@ -4310,7 +4387,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4324,7 +4401,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4362,7 +4439,7 @@ public readonly host: string; Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#host DatabaseSecretBackendConnection#host} --- @@ -4376,7 +4453,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4390,7 +4467,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4404,7 +4481,7 @@ public readonly caCert: string; The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#ca_cert DatabaseSecretBackendConnection#ca_cert} --- @@ -4418,7 +4495,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#insecure_tls DatabaseSecretBackendConnection#insecure_tls} --- @@ -4432,7 +4509,7 @@ public readonly port: number; The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#port DatabaseSecretBackendConnection#port} --- @@ -4446,7 +4523,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#tls DatabaseSecretBackendConnection#tls} --- @@ -4481,7 +4558,7 @@ public readonly url: string; The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#url DatabaseSecretBackendConnection#url} --- @@ -4497,7 +4574,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4513,7 +4590,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#region DatabaseSecretBackendConnection#region} --- @@ -4529,7 +4606,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4568,7 +4645,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4582,7 +4659,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#disable_escaping DatabaseSecretBackendConnection#disable_escaping} --- @@ -4596,7 +4673,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4610,7 +4687,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4624,7 +4701,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4638,7 +4715,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4652,7 +4729,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4666,7 +4743,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4704,7 +4781,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#connection_url DatabaseSecretBackendConnection#connection_url} --- @@ -4718,7 +4795,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_connection_lifetime DatabaseSecretBackendConnection#max_connection_lifetime} --- @@ -4732,7 +4809,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_idle_connections DatabaseSecretBackendConnection#max_idle_connections} --- @@ -4746,7 +4823,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#max_open_connections DatabaseSecretBackendConnection#max_open_connections} --- @@ -4760,7 +4837,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#password DatabaseSecretBackendConnection#password} --- @@ -4774,7 +4851,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username DatabaseSecretBackendConnection#username} --- @@ -4788,7 +4865,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_connection#username_template DatabaseSecretBackendConnection#username_template} --- @@ -4852,6 +4929,7 @@ The attribute on the parent resource this class is referencing. | resetPemJson | *No description.* | | resetPort | *No description.* | | resetProtocolVersion | *No description.* | +| resetSkipVerification | *No description.* | | resetTls | *No description.* | | resetUsername | *No description.* | @@ -5055,6 +5133,12 @@ public resetPort(): void public resetProtocolVersion(): void ``` +##### `resetSkipVerification` + +```typescript +public resetSkipVerification(): void +``` + ##### `resetTls` ```typescript @@ -5082,6 +5166,7 @@ public resetUsername(): void | pemJsonInput | string | *No description.* | | portInput | number | *No description.* | | protocolVersionInput | number | *No description.* | +| skipVerificationInput | boolean \| cdktf.IResolvable | *No description.* | | tlsInput | boolean \| cdktf.IResolvable | *No description.* | | usernameInput | string | *No description.* | | connectTimeout | number | *No description.* | @@ -5092,6 +5177,7 @@ public resetUsername(): void | pemJson | string | *No description.* | | port | number | *No description.* | | protocolVersion | number | *No description.* | +| skipVerification | boolean \| cdktf.IResolvable | *No description.* | | tls | boolean \| cdktf.IResolvable | *No description.* | | username | string | *No description.* | | internalValue | DatabaseSecretBackendConnectionCassandra | *No description.* | @@ -5202,6 +5288,16 @@ public readonly protocolVersionInput: number; --- +##### `skipVerificationInput`Optional + +```typescript +public readonly skipVerificationInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `tlsInput`Optional ```typescript @@ -5302,6 +5398,16 @@ public readonly protocolVersion: number; --- +##### `skipVerification`Required + +```typescript +public readonly skipVerification: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `tls`Required ```typescript @@ -11397,7 +11503,11 @@ The attribute on the parent resource this class is referencing. | resetMaxIdleConnections | *No description.* | | resetMaxOpenConnections | *No description.* | | resetPassword | *No description.* | +| resetPrivateKey | *No description.* | +| resetSelfManaged | *No description.* | | resetServiceAccountJson | *No description.* | +| resetTlsCa | *No description.* | +| resetTlsCertificate | *No description.* | | resetUsername | *No description.* | | resetUsernameTemplate | *No description.* | @@ -11595,12 +11705,36 @@ public resetMaxOpenConnections(): void public resetPassword(): void ``` +##### `resetPrivateKey` + +```typescript +public resetPrivateKey(): void +``` + +##### `resetSelfManaged` + +```typescript +public resetSelfManaged(): void +``` + ##### `resetServiceAccountJson` ```typescript public resetServiceAccountJson(): void ``` +##### `resetTlsCa` + +```typescript +public resetTlsCa(): void +``` + +##### `resetTlsCertificate` + +```typescript +public resetTlsCertificate(): void +``` + ##### `resetUsername` ```typescript @@ -11627,7 +11761,11 @@ public resetUsernameTemplate(): void | maxIdleConnectionsInput | number | *No description.* | | maxOpenConnectionsInput | number | *No description.* | | passwordInput | string | *No description.* | +| privateKeyInput | string | *No description.* | +| selfManagedInput | boolean \| cdktf.IResolvable | *No description.* | | serviceAccountJsonInput | string | *No description.* | +| tlsCaInput | string | *No description.* | +| tlsCertificateInput | string | *No description.* | | usernameInput | string | *No description.* | | usernameTemplateInput | string | *No description.* | | authType | string | *No description.* | @@ -11637,7 +11775,11 @@ public resetUsernameTemplate(): void | maxIdleConnections | number | *No description.* | | maxOpenConnections | number | *No description.* | | password | string | *No description.* | +| privateKey | string | *No description.* | +| selfManaged | boolean \| cdktf.IResolvable | *No description.* | | serviceAccountJson | string | *No description.* | +| tlsCa | string | *No description.* | +| tlsCertificate | string | *No description.* | | username | string | *No description.* | | usernameTemplate | string | *No description.* | | internalValue | DatabaseSecretBackendConnectionPostgresql | *No description.* | @@ -11738,6 +11880,26 @@ public readonly passwordInput: string; --- +##### `privateKeyInput`Optional + +```typescript +public readonly privateKeyInput: string; +``` + +- *Type:* string + +--- + +##### `selfManagedInput`Optional + +```typescript +public readonly selfManagedInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `serviceAccountJsonInput`Optional ```typescript @@ -11748,6 +11910,26 @@ public readonly serviceAccountJsonInput: string; --- +##### `tlsCaInput`Optional + +```typescript +public readonly tlsCaInput: string; +``` + +- *Type:* string + +--- + +##### `tlsCertificateInput`Optional + +```typescript +public readonly tlsCertificateInput: string; +``` + +- *Type:* string + +--- + ##### `usernameInput`Optional ```typescript @@ -11838,6 +12020,26 @@ public readonly password: string; --- +##### `privateKey`Required + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +--- + +##### `selfManaged`Required + +```typescript +public readonly selfManaged: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `serviceAccountJson`Required ```typescript @@ -11848,6 +12050,26 @@ public readonly serviceAccountJson: string; --- +##### `tlsCa`Required + +```typescript +public readonly tlsCa: string; +``` + +- *Type:* string + +--- + +##### `tlsCertificate`Required + +```typescript +public readonly tlsCertificate: string; +``` + +- *Type:* string + +--- + ##### `username`Required ```typescript diff --git a/docs/databaseSecretBackendRole.csharp.md b/docs/databaseSecretBackendRole.csharp.md index 3d838cc0..c35699b4 100644 --- a/docs/databaseSecretBackendRole.csharp.md +++ b/docs/databaseSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1060,7 +1060,7 @@ new DatabaseSecretBackendRoleConfig { | CredentialConfig | System.Collections.Generic.IDictionary | Specifies the configuration for the given credential_type. | | CredentialType | string | Specifies the type of credential that will be generated for the role. | | DefaultTtl | double | Default TTL for leases associated with this role, in seconds. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | MaxTtl | double | Maximum TTL for leases associated with this role, in seconds. | | Namespace | string | Target namespace. (requires Enterprise). | | RenewStatements | string[] | Database statements to execute to renew a user. | @@ -1149,7 +1149,7 @@ public string Backend { get; set; } The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1163,7 +1163,7 @@ public string[] CreationStatements { get; set; } Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1177,7 +1177,7 @@ public string DbName { get; set; } Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1191,7 +1191,7 @@ public string Name { get; set; } Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1205,7 +1205,7 @@ public System.Collections.Generic.IDictionary CredentialConfig { Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1219,7 +1219,7 @@ public string CredentialType { get; set; } Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1233,7 +1233,7 @@ public double DefaultTtl { get; set; } Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1245,7 +1245,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1262,7 +1262,7 @@ public double MaxTtl { get; set; } Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1276,7 +1276,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1290,7 +1290,7 @@ public string[] RenewStatements { get; set; } Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1304,7 +1304,7 @@ public string[] RevocationStatements { get; set; } Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1318,7 +1318,7 @@ public string[] RollbackStatements { get; set; } Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.go.md b/docs/databaseSecretBackendRole.go.md index 965d09e1..9101fc08 100644 --- a/docs/databaseSecretBackendRole.go.md +++ b/docs/databaseSecretBackendRole.go.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1060,7 +1060,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend | CredentialConfig | *map[string]*string | Specifies the configuration for the given credential_type. | | CredentialType | *string | Specifies the type of credential that will be generated for the role. | | DefaultTtl | *f64 | Default TTL for leases associated with this role, in seconds. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | MaxTtl | *f64 | Maximum TTL for leases associated with this role, in seconds. | | Namespace | *string | Target namespace. (requires Enterprise). | | RenewStatements | *[]*string | Database statements to execute to renew a user. | @@ -1149,7 +1149,7 @@ Backend *string The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1163,7 +1163,7 @@ CreationStatements *[]*string Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1177,7 +1177,7 @@ DbName *string Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1191,7 +1191,7 @@ Name *string Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1205,7 +1205,7 @@ CredentialConfig *map[string]*string Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1219,7 +1219,7 @@ CredentialType *string Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1233,7 +1233,7 @@ DefaultTtl *f64 Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1245,7 +1245,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1262,7 +1262,7 @@ MaxTtl *f64 Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1276,7 +1276,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1290,7 +1290,7 @@ RenewStatements *[]*string Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1304,7 +1304,7 @@ RevocationStatements *[]*string Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1318,7 +1318,7 @@ RollbackStatements *[]*string Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.java.md b/docs/databaseSecretBackendRole.java.md index d328d391..dd315d27 100644 --- a/docs/databaseSecretBackendRole.java.md +++ b/docs/databaseSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -57,7 +57,7 @@ DatabaseSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | credentialConfig | java.util.Map | Specifies the configuration for the given credential_type. | | credentialType | java.lang.String | Specifies the type of credential that will be generated for the role. | | defaultTtl | java.lang.Number | Default TTL for leases associated with this role, in seconds. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | renewStatements | java.util.List | Database statements to execute to renew a user. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- @@ -743,7 +743,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1277,7 +1277,7 @@ DatabaseSecretBackendRoleConfig.builder() | credentialConfig | java.util.Map | Specifies the configuration for the given credential_type. | | credentialType | java.lang.String | Specifies the type of credential that will be generated for the role. | | defaultTtl | java.lang.Number | Default TTL for leases associated with this role, in seconds. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | java.lang.Number | Maximum TTL for leases associated with this role, in seconds. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | renewStatements | java.util.List | Database statements to execute to renew a user. | @@ -1366,7 +1366,7 @@ public java.lang.String getBackend(); The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1380,7 +1380,7 @@ public java.util.List getCreationStatements(); Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1394,7 +1394,7 @@ public java.lang.String getDbName(); Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1408,7 +1408,7 @@ public java.lang.String getName(); Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1422,7 +1422,7 @@ public java.util.Map getCredentialConfig(); Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1436,7 +1436,7 @@ public java.lang.String getCredentialType(); Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1450,7 +1450,7 @@ public java.lang.Number getDefaultTtl(); Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1462,7 +1462,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1479,7 +1479,7 @@ public java.lang.Number getMaxTtl(); Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1493,7 +1493,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1507,7 +1507,7 @@ public java.util.List getRenewStatements(); Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1521,7 +1521,7 @@ public java.util.List getRevocationStatements(); Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1535,7 +1535,7 @@ public java.util.List getRollbackStatements(); Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.python.md b/docs/databaseSecretBackendRole.python.md index e065df84..99e46790 100644 --- a/docs/databaseSecretBackendRole.python.md +++ b/docs/databaseSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -55,7 +55,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRole( | credential_config | typing.Mapping[str] | Specifies the configuration for the given credential_type. | | credential_type | str | Specifies the type of credential that will be generated for the role. | | default_ttl | typing.Union[int, float] | Default TTL for leases associated with this role, in seconds. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | renew_statements | typing.List[str] | Database statements to execute to renew a user. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -211,7 +211,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- @@ -787,7 +787,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1317,7 +1317,7 @@ databaseSecretBackendRole.DatabaseSecretBackendRoleConfig( | credential_config | typing.Mapping[str] | Specifies the configuration for the given credential_type. | | credential_type | str | Specifies the type of credential that will be generated for the role. | | default_ttl | typing.Union[int, float] | Default TTL for leases associated with this role, in seconds. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | max_ttl | typing.Union[int, float] | Maximum TTL for leases associated with this role, in seconds. | | namespace | str | Target namespace. (requires Enterprise). | | renew_statements | typing.List[str] | Database statements to execute to renew a user. | @@ -1406,7 +1406,7 @@ backend: str The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1420,7 +1420,7 @@ creation_statements: typing.List[str] Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1434,7 +1434,7 @@ db_name: str Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1448,7 +1448,7 @@ name: str Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1462,7 +1462,7 @@ credential_config: typing.Mapping[str] Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1476,7 +1476,7 @@ credential_type: str Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1490,7 +1490,7 @@ default_ttl: typing.Union[int, float] Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1502,7 +1502,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1519,7 +1519,7 @@ max_ttl: typing.Union[int, float] Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1533,7 +1533,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1547,7 +1547,7 @@ renew_statements: typing.List[str] Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1561,7 +1561,7 @@ revocation_statements: typing.List[str] Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1575,7 +1575,7 @@ rollback_statements: typing.List[str] Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendRole.typescript.md b/docs/databaseSecretBackendRole.typescript.md index 6b6459f3..6e2bd45f 100644 --- a/docs/databaseSecretBackendRole.typescript.md +++ b/docs/databaseSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role vault_database_secret_backend_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the DatabaseSecretBackendRole The id of the existing DatabaseSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ const databaseSecretBackendRoleConfig: databaseSecretBackendRole.DatabaseSecretB | credentialConfig | {[ key: string ]: string} | Specifies the configuration for the given credential_type. | | credentialType | string | Specifies the type of credential that will be generated for the role. | | defaultTtl | number | Default TTL for leases associated with this role, in seconds. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. | | maxTtl | number | Maximum TTL for leases associated with this role, in seconds. | | namespace | string | Target namespace. (requires Enterprise). | | renewStatements | string[] | Database statements to execute to renew a user. | @@ -1128,7 +1128,7 @@ public readonly backend: string; The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#backend DatabaseSecretBackendRole#backend} --- @@ -1142,7 +1142,7 @@ public readonly creationStatements: string[]; Database statements to execute to create and configure a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#creation_statements DatabaseSecretBackendRole#creation_statements} --- @@ -1156,7 +1156,7 @@ public readonly dbName: string; Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#db_name DatabaseSecretBackendRole#db_name} --- @@ -1170,7 +1170,7 @@ public readonly name: string; Unique name for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#name DatabaseSecretBackendRole#name} --- @@ -1184,7 +1184,7 @@ public readonly credentialConfig: {[ key: string ]: string}; Specifies the configuration for the given credential_type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_config DatabaseSecretBackendRole#credential_config} --- @@ -1198,7 +1198,7 @@ public readonly credentialType: string; Specifies the type of credential that will be generated for the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#credential_type DatabaseSecretBackendRole#credential_type} --- @@ -1212,7 +1212,7 @@ public readonly defaultTtl: number; Default TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#default_ttl DatabaseSecretBackendRole#default_ttl} --- @@ -1224,7 +1224,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#id DatabaseSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1241,7 +1241,7 @@ public readonly maxTtl: number; Maximum TTL for leases associated with this role, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#max_ttl DatabaseSecretBackendRole#max_ttl} --- @@ -1255,7 +1255,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#namespace DatabaseSecretBackendRole#namespace} --- @@ -1269,7 +1269,7 @@ public readonly renewStatements: string[]; Database statements to execute to renew a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#renew_statements DatabaseSecretBackendRole#renew_statements} --- @@ -1283,7 +1283,7 @@ public readonly revocationStatements: string[]; Database statements to execute to revoke a user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#revocation_statements DatabaseSecretBackendRole#revocation_statements} --- @@ -1297,7 +1297,7 @@ public readonly rollbackStatements: string[]; Database statements to execute to rollback a create operation in the event of an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_role#rollback_statements DatabaseSecretBackendRole#rollback_statements} --- diff --git a/docs/databaseSecretBackendStaticRole.csharp.md b/docs/databaseSecretBackendStaticRole.csharp.md index 5cafdf7f..ed342eee 100644 --- a/docs/databaseSecretBackendStaticRole.csharp.md +++ b/docs/databaseSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | ResetRotationSchedule | *No description.* | | ResetRotationStatements | *No description.* | | ResetRotationWindow | *No description.* | +| ResetSelfManagedPassword | *No description.* | --- @@ -406,6 +407,12 @@ private void ResetRotationStatements() private void ResetRotationWindow() ``` +##### `ResetSelfManagedPassword` + +```csharp +private void ResetSelfManagedPassword() +``` + #### Static Functions | **Name** | **Description** | @@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | RotationScheduleInput | string | *No description.* | | RotationStatementsInput | string[] | *No description.* | | RotationWindowInput | double | *No description.* | +| SelfManagedPasswordInput | string | *No description.* | | UsernameInput | string | *No description.* | | Backend | string | *No description.* | | DbName | string | *No description.* | @@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | RotationSchedule | string | *No description.* | | RotationStatements | string[] | *No description.* | | RotationWindow | double | *No description.* | +| SelfManagedPassword | string | *No description.* | | Username | string | *No description.* | --- @@ -794,6 +803,16 @@ public double RotationWindowInput { get; } --- +##### `SelfManagedPasswordInput`Optional + +```csharp +public string SelfManagedPasswordInput { get; } +``` + +- *Type:* string + +--- + ##### `UsernameInput`Optional ```csharp @@ -894,6 +913,16 @@ public double RotationWindow { get; } --- +##### `SelfManagedPassword`Required + +```csharp +public string SelfManagedPassword { get; } +``` + +- *Type:* string + +--- + ##### `Username`Required ```csharp @@ -948,7 +977,8 @@ new DatabaseSecretBackendStaticRoleConfig { double RotationPeriod = null, string RotationSchedule = null, string[] RotationStatements = null, - double RotationWindow = null + double RotationWindow = null, + string SelfManagedPassword = null }; ``` @@ -967,12 +997,13 @@ new DatabaseSecretBackendStaticRoleConfig { | DbName | string | Database connection to use for this role. | | Name | string | Unique name for the static role. | | Username | string | The database username that this role corresponds to. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RotationPeriod | double | The amount of time Vault should wait before rotating the password, in seconds. | | RotationSchedule | string | A cron-style string that will define the schedule on which rotations should occur. | | RotationStatements | string[] | Database statements to execute to rotate the password for the configured database user. | | RotationWindow | double | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| SelfManagedPassword | string | The password corresponding to the username in the database. | --- @@ -1056,7 +1087,7 @@ public string Backend { get; set; } The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1070,7 +1101,7 @@ public string DbName { get; set; } Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1084,7 +1115,7 @@ public string Name { get; set; } Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1098,7 +1129,7 @@ public string Username { get; set; } The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1110,7 +1141,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1158,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1141,7 +1172,7 @@ public double RotationPeriod { get; set; } The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1155,7 +1186,7 @@ public string RotationSchedule { get; set; } A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1169,7 +1200,7 @@ public string[] RotationStatements { get; set; } Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1183,7 +1214,23 @@ public double RotationWindow { get; set; } The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `SelfManagedPassword`Optional + +```csharp +public string SelfManagedPassword { get; set; } +``` + +- *Type:* string + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- diff --git a/docs/databaseSecretBackendStaticRole.go.md b/docs/databaseSecretBackendStaticRole.go.md index 5c6c1b78..3e83530f 100644 --- a/docs/databaseSecretBackendStaticRole.go.md +++ b/docs/databaseSecretBackendStaticRole.go.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | ResetRotationSchedule | *No description.* | | ResetRotationStatements | *No description.* | | ResetRotationWindow | *No description.* | +| ResetSelfManagedPassword | *No description.* | --- @@ -406,6 +407,12 @@ func ResetRotationStatements() func ResetRotationWindow() ``` +##### `ResetSelfManagedPassword` + +```go +func ResetSelfManagedPassword() +``` + #### Static Functions | **Name** | **Description** | @@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | RotationScheduleInput | *string | *No description.* | | RotationStatementsInput | *[]*string | *No description.* | | RotationWindowInput | *f64 | *No description.* | +| SelfManagedPasswordInput | *string | *No description.* | | UsernameInput | *string | *No description.* | | Backend | *string | *No description.* | | DbName | *string | *No description.* | @@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | RotationSchedule | *string | *No description.* | | RotationStatements | *[]*string | *No description.* | | RotationWindow | *f64 | *No description.* | +| SelfManagedPassword | *string | *No description.* | | Username | *string | *No description.* | --- @@ -794,6 +803,16 @@ func RotationWindowInput() *f64 --- +##### `SelfManagedPasswordInput`Optional + +```go +func SelfManagedPasswordInput() *string +``` + +- *Type:* *string + +--- + ##### `UsernameInput`Optional ```go @@ -894,6 +913,16 @@ func RotationWindow() *f64 --- +##### `SelfManagedPassword`Required + +```go +func SelfManagedPassword() *string +``` + +- *Type:* *string + +--- + ##### `Username`Required ```go @@ -949,6 +978,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend RotationSchedule: *string, RotationStatements: *[]*string, RotationWindow: *f64, + SelfManagedPassword: *string, } ``` @@ -967,12 +997,13 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretbackend | DbName | *string | Database connection to use for this role. | | Name | *string | Unique name for the static role. | | Username | *string | The database username that this role corresponds to. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RotationPeriod | *f64 | The amount of time Vault should wait before rotating the password, in seconds. | | RotationSchedule | *string | A cron-style string that will define the schedule on which rotations should occur. | | RotationStatements | *[]*string | Database statements to execute to rotate the password for the configured database user. | | RotationWindow | *f64 | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| SelfManagedPassword | *string | The password corresponding to the username in the database. | --- @@ -1056,7 +1087,7 @@ Backend *string The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1070,7 +1101,7 @@ DbName *string Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1084,7 +1115,7 @@ Name *string Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1098,7 +1129,7 @@ Username *string The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1110,7 +1141,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1158,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1141,7 +1172,7 @@ RotationPeriod *f64 The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1155,7 +1186,7 @@ RotationSchedule *string A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1169,7 +1200,7 @@ RotationStatements *[]*string Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1183,7 +1214,23 @@ RotationWindow *f64 The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `SelfManagedPassword`Optional + +```go +SelfManagedPassword *string +``` + +- *Type:* *string + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- diff --git a/docs/databaseSecretBackendStaticRole.java.md b/docs/databaseSecretBackendStaticRole.java.md index 3e07bad8..9a954ea6 100644 --- a/docs/databaseSecretBackendStaticRole.java.md +++ b/docs/databaseSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -33,6 +33,7 @@ DatabaseSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String // .rotationSchedule(java.lang.String) // .rotationStatements(java.util.List) // .rotationWindow(java.lang.Number) +// .selfManagedPassword(java.lang.String) .build(); ``` @@ -51,12 +52,13 @@ DatabaseSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String | dbName | java.lang.String | Database connection to use for this role. | | name | java.lang.String | Unique name for the static role. | | username | java.lang.String | The database username that this role corresponds to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | java.lang.String | A cron-style string that will define the schedule on which rotations should occur. | | rotationStatements | java.util.List | Database statements to execute to rotate the password for the configured database user. | | rotationWindow | java.lang.Number | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| selfManagedPassword | java.lang.String | The password corresponding to the username in the database. | --- @@ -126,7 +128,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -136,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -146,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -156,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -164,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -187,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -197,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -207,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -217,7 +219,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `selfManagedPassword`Optional + +- *Type:* java.lang.String + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- @@ -254,6 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetRotationSchedule | *No description.* | | resetRotationStatements | *No description.* | | resetRotationWindow | *No description.* | +| resetSelfManagedPassword | *No description.* | --- @@ -583,6 +598,12 @@ public void resetRotationStatements() public void resetRotationWindow() ``` +##### `resetSelfManagedPassword` + +```java +public void resetSelfManagedPassword() +``` + #### Static Functions | **Name** | **Description** | @@ -686,7 +707,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -725,6 +746,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotationScheduleInput | java.lang.String | *No description.* | | rotationStatementsInput | java.util.List | *No description.* | | rotationWindowInput | java.lang.Number | *No description.* | +| selfManagedPasswordInput | java.lang.String | *No description.* | | usernameInput | java.lang.String | *No description.* | | backend | java.lang.String | *No description.* | | dbName | java.lang.String | *No description.* | @@ -735,6 +757,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotationSchedule | java.lang.String | *No description.* | | rotationStatements | java.util.List | *No description.* | | rotationWindow | java.lang.Number | *No description.* | +| selfManagedPassword | java.lang.String | *No description.* | | username | java.lang.String | *No description.* | --- @@ -971,6 +994,16 @@ public java.lang.Number getRotationWindowInput(); --- +##### `selfManagedPasswordInput`Optional + +```java +public java.lang.String getSelfManagedPasswordInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `usernameInput`Optional ```java @@ -1071,6 +1104,16 @@ public java.lang.Number getRotationWindow(); --- +##### `selfManagedPassword`Required + +```java +public java.lang.String getSelfManagedPassword(); +``` + +- *Type:* java.lang.String + +--- + ##### `username`Required ```java @@ -1130,6 +1173,7 @@ DatabaseSecretBackendStaticRoleConfig.builder() // .rotationSchedule(java.lang.String) // .rotationStatements(java.util.List) // .rotationWindow(java.lang.Number) +// .selfManagedPassword(java.lang.String) .build(); ``` @@ -1148,12 +1192,13 @@ DatabaseSecretBackendStaticRoleConfig.builder() | dbName | java.lang.String | Database connection to use for this role. | | name | java.lang.String | Unique name for the static role. | | username | java.lang.String | The database username that this role corresponds to. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | java.lang.String | A cron-style string that will define the schedule on which rotations should occur. | | rotationStatements | java.util.List | Database statements to execute to rotate the password for the configured database user. | | rotationWindow | java.lang.Number | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| selfManagedPassword | java.lang.String | The password corresponding to the username in the database. | --- @@ -1237,7 +1282,7 @@ public java.lang.String getBackend(); The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1251,7 +1296,7 @@ public java.lang.String getDbName(); Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1265,7 +1310,7 @@ public java.lang.String getName(); Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1279,7 +1324,7 @@ public java.lang.String getUsername(); The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1291,7 +1336,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1308,7 +1353,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1322,7 +1367,7 @@ public java.lang.Number getRotationPeriod(); The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1336,7 +1381,7 @@ public java.lang.String getRotationSchedule(); A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1350,7 +1395,7 @@ public java.util.List getRotationStatements(); Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1364,7 +1409,23 @@ public java.lang.Number getRotationWindow(); The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `selfManagedPassword`Optional + +```java +public java.lang.String getSelfManagedPassword(); +``` + +- *Type:* java.lang.String + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- diff --git a/docs/databaseSecretBackendStaticRole.python.md b/docs/databaseSecretBackendStaticRole.python.md index b96df3d1..6a43704f 100644 --- a/docs/databaseSecretBackendStaticRole.python.md +++ b/docs/databaseSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -30,7 +30,8 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRole( rotation_period: typing.Union[int, float] = None, rotation_schedule: str = None, rotation_statements: typing.List[str] = None, - rotation_window: typing.Union[int, float] = None + rotation_window: typing.Union[int, float] = None, + self_managed_password: str = None ) ``` @@ -49,12 +50,13 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRole( | db_name | str | Database connection to use for this role. | | name | str | Unique name for the static role. | | username | str | The database username that this role corresponds to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | The amount of time Vault should wait before rotating the password, in seconds. | | rotation_schedule | str | A cron-style string that will define the schedule on which rotations should occur. | | rotation_statements | typing.List[str] | Database statements to execute to rotate the password for the configured database user. | | rotation_window | typing.Union[int, float] | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| self_managed_password | str | The password corresponding to the username in the database. | --- @@ -124,7 +126,7 @@ Must be unique amongst siblings in the same scope The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -134,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -154,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -162,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -185,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -195,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -205,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -215,7 +217,19 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `self_managed_password`Optional + +- *Type:* str + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- @@ -252,6 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_rotation_schedule | *No description.* | | reset_rotation_statements | *No description.* | | reset_rotation_window | *No description.* | +| reset_self_managed_password | *No description.* | --- @@ -616,6 +631,12 @@ def reset_rotation_statements() -> None def reset_rotation_window() -> None ``` +##### `reset_self_managed_password` + +```python +def reset_self_managed_password() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -730,7 +751,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -769,6 +790,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotation_schedule_input | str | *No description.* | | rotation_statements_input | typing.List[str] | *No description.* | | rotation_window_input | typing.Union[int, float] | *No description.* | +| self_managed_password_input | str | *No description.* | | username_input | str | *No description.* | | backend | str | *No description.* | | db_name | str | *No description.* | @@ -779,6 +801,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotation_schedule | str | *No description.* | | rotation_statements | typing.List[str] | *No description.* | | rotation_window | typing.Union[int, float] | *No description.* | +| self_managed_password | str | *No description.* | | username | str | *No description.* | --- @@ -1015,6 +1038,16 @@ rotation_window_input: typing.Union[int, float] --- +##### `self_managed_password_input`Optional + +```python +self_managed_password_input: str +``` + +- *Type:* str + +--- + ##### `username_input`Optional ```python @@ -1115,6 +1148,16 @@ rotation_window: typing.Union[int, float] --- +##### `self_managed_password`Required + +```python +self_managed_password: str +``` + +- *Type:* str + +--- + ##### `username`Required ```python @@ -1169,7 +1212,8 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRoleConfig( rotation_period: typing.Union[int, float] = None, rotation_schedule: str = None, rotation_statements: typing.List[str] = None, - rotation_window: typing.Union[int, float] = None + rotation_window: typing.Union[int, float] = None, + self_managed_password: str = None ) ``` @@ -1188,12 +1232,13 @@ databaseSecretBackendStaticRole.DatabaseSecretBackendStaticRoleConfig( | db_name | str | Database connection to use for this role. | | name | str | Unique name for the static role. | | username | str | The database username that this role corresponds to. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | The amount of time Vault should wait before rotating the password, in seconds. | | rotation_schedule | str | A cron-style string that will define the schedule on which rotations should occur. | | rotation_statements | typing.List[str] | Database statements to execute to rotate the password for the configured database user. | | rotation_window | typing.Union[int, float] | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| self_managed_password | str | The password corresponding to the username in the database. | --- @@ -1277,7 +1322,7 @@ backend: str The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1291,7 +1336,7 @@ db_name: str Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1305,7 +1350,7 @@ name: str Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1319,7 +1364,7 @@ username: str The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1331,7 +1376,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1348,7 +1393,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1362,7 +1407,7 @@ rotation_period: typing.Union[int, float] The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1376,7 +1421,7 @@ rotation_schedule: str A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1390,7 +1435,7 @@ rotation_statements: typing.List[str] Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1404,7 +1449,23 @@ rotation_window: typing.Union[int, float] The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `self_managed_password`Optional + +```python +self_managed_password: str +``` + +- *Type:* str + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- diff --git a/docs/databaseSecretBackendStaticRole.typescript.md b/docs/databaseSecretBackendStaticRole.typescript.md index d269dab5..32348b02 100644 --- a/docs/databaseSecretBackendStaticRole.typescript.md +++ b/docs/databaseSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role vault_database_secret_backend_static_role}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | resetRotationSchedule | *No description.* | | resetRotationStatements | *No description.* | | resetRotationWindow | *No description.* | +| resetSelfManagedPassword | *No description.* | --- @@ -406,6 +407,12 @@ public resetRotationStatements(): void public resetRotationWindow(): void ``` +##### `resetSelfManagedPassword` + +```typescript +public resetSelfManagedPassword(): void +``` + #### Static Functions | **Name** | **Description** | @@ -509,7 +516,7 @@ The construct id used in the generated config for the DatabaseSecretBackendStati The id of the existing DatabaseSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -548,6 +555,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotationScheduleInput | string | *No description.* | | rotationStatementsInput | string[] | *No description.* | | rotationWindowInput | number | *No description.* | +| selfManagedPasswordInput | string | *No description.* | | usernameInput | string | *No description.* | | backend | string | *No description.* | | dbName | string | *No description.* | @@ -558,6 +566,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | rotationSchedule | string | *No description.* | | rotationStatements | string[] | *No description.* | | rotationWindow | number | *No description.* | +| selfManagedPassword | string | *No description.* | | username | string | *No description.* | --- @@ -794,6 +803,16 @@ public readonly rotationWindowInput: number; --- +##### `selfManagedPasswordInput`Optional + +```typescript +public readonly selfManagedPasswordInput: string; +``` + +- *Type:* string + +--- + ##### `usernameInput`Optional ```typescript @@ -894,6 +913,16 @@ public readonly rotationWindow: number; --- +##### `selfManagedPassword`Required + +```typescript +public readonly selfManagedPassword: string; +``` + +- *Type:* string + +--- + ##### `username`Required ```typescript @@ -949,12 +978,13 @@ const databaseSecretBackendStaticRoleConfig: databaseSecretBackendStaticRole.Dat | dbName | string | Database connection to use for this role. | | name | string | Unique name for the static role. | | username | string | The database username that this role corresponds to. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rotationPeriod | number | The amount of time Vault should wait before rotating the password, in seconds. | | rotationSchedule | string | A cron-style string that will define the schedule on which rotations should occur. | | rotationStatements | string[] | Database statements to execute to rotate the password for the configured database user. | | rotationWindow | number | The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. | +| selfManagedPassword | string | The password corresponding to the username in the database. | --- @@ -1038,7 +1068,7 @@ public readonly backend: string; The path of the Database Secret Backend the role belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#backend DatabaseSecretBackendStaticRole#backend} --- @@ -1052,7 +1082,7 @@ public readonly dbName: string; Database connection to use for this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#db_name DatabaseSecretBackendStaticRole#db_name} --- @@ -1066,7 +1096,7 @@ public readonly name: string; Unique name for the static role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#name DatabaseSecretBackendStaticRole#name} --- @@ -1080,7 +1110,7 @@ public readonly username: string; The database username that this role corresponds to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#username DatabaseSecretBackendStaticRole#username} --- @@ -1092,7 +1122,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#id DatabaseSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1109,7 +1139,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#namespace DatabaseSecretBackendStaticRole#namespace} --- @@ -1123,7 +1153,7 @@ public readonly rotationPeriod: number; The amount of time Vault should wait before rotating the password, in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_period DatabaseSecretBackendStaticRole#rotation_period} --- @@ -1137,7 +1167,7 @@ public readonly rotationSchedule: string; A cron-style string that will define the schedule on which rotations should occur. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_schedule DatabaseSecretBackendStaticRole#rotation_schedule} --- @@ -1151,7 +1181,7 @@ public readonly rotationStatements: string[]; Database statements to execute to rotate the password for the configured database user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_statements DatabaseSecretBackendStaticRole#rotation_statements} --- @@ -1165,7 +1195,23 @@ public readonly rotationWindow: number; The amount of time in seconds in which the rotations are allowed to occur starting from a given rotation_schedule. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#rotation_window DatabaseSecretBackendStaticRole#rotation_window} + +--- + +##### `selfManagedPassword`Optional + +```typescript +public readonly selfManagedPassword: string; +``` + +- *Type:* string + +The password corresponding to the username in the database. + +Required when using the Rootless Password Rotation workflow for static roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secret_backend_static_role#self_managed_password DatabaseSecretBackendStaticRole#self_managed_password} --- diff --git a/docs/databaseSecretsMount.csharp.md b/docs/databaseSecretsMount.csharp.md index ec01d51b..3d8e3aaf 100644 --- a/docs/databaseSecretsMount.csharp.md +++ b/docs/databaseSecretsMount.csharp.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2005,6 +2005,7 @@ new DatabaseSecretsMountCassandra { double Port = null, double ProtocolVersion = null, string[] RootRotationStatements = null, + object SkipVerification = null, object Tls = null, string Username = null, object VerifyConnection = null @@ -2028,6 +2029,7 @@ new DatabaseSecretsMountCassandra { | Port | double | The transport port to use to connect to Cassandra. | | ProtocolVersion | double | The CQL protocol version to use. | | RootRotationStatements | string[] | A list of database statements to be executed to rotate the root user's credentials. | +| SkipVerification | object | Skip permissions checks when a connection to Cassandra is first created. | | Tls | object | Whether to use TLS when connecting to Cassandra. | | Username | string | The username to use when authenticating with Cassandra. | | VerifyConnection | object | Specifies if the connection is verified during initial configuration. | @@ -2044,7 +2046,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2058,7 +2060,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2072,7 +2074,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2086,7 +2088,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2100,7 +2102,7 @@ public string[] Hosts { get; set; } Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2114,7 +2116,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2128,7 +2130,7 @@ public string Password { get; set; } The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2144,7 +2146,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2160,7 +2162,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2176,7 +2178,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2190,7 +2192,7 @@ public double Port { get; set; } The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2204,7 +2206,7 @@ public double ProtocolVersion { get; set; } The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2218,7 +2220,23 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `SkipVerification`Optional + +```csharp +public object SkipVerification { get; set; } +``` + +- *Type:* object + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification} --- @@ -2232,7 +2250,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2246,7 +2264,7 @@ public string Username { get; set; } The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2260,7 +2278,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2343,7 +2361,7 @@ new DatabaseSecretsMountConfig { | Elasticsearch | object | elasticsearch block. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | | Hana | object | hana block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | IdentityTokenKey | string | The key to use for signing plugin workload identity tokens. | | Influxdb | object | influxdb block. | | ListingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -2450,7 +2468,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2464,7 +2482,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2478,7 +2496,7 @@ public string[] AllowedResponseHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -2492,7 +2510,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2506,7 +2524,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2520,7 +2538,7 @@ public object Cassandra { get; set; } cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2534,7 +2552,7 @@ public object Couchbase { get; set; } couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2548,7 +2566,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2562,7 +2580,7 @@ public string[] DelegatedAuthAccessors { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -2576,7 +2594,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2590,7 +2608,7 @@ public object Elasticsearch { get; set; } elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2604,7 +2622,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2618,7 +2636,7 @@ public object Hana { get; set; } hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2630,7 +2648,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2647,7 +2665,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -2661,7 +2679,7 @@ public object Influxdb { get; set; } influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2675,7 +2693,7 @@ public string ListingVisibility { get; set; } Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -2689,7 +2707,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2703,7 +2721,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2717,7 +2735,7 @@ public object Mongodb { get; set; } mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2731,7 +2749,7 @@ public object Mongodbatlas { get; set; } mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2745,7 +2763,7 @@ public object Mssql { get; set; } mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2759,7 +2777,7 @@ public object Mysql { get; set; } mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2773,7 +2791,7 @@ public object MysqlAurora { get; set; } mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2787,7 +2805,7 @@ public object MysqlLegacy { get; set; } mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2801,7 +2819,7 @@ public object MysqlRds { get; set; } mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2815,7 +2833,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2829,7 +2847,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2843,7 +2861,7 @@ public object Oracle { get; set; } oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2857,7 +2875,7 @@ public string[] PassthroughRequestHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -2871,7 +2889,7 @@ public string PluginVersion { get; set; } Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -2885,7 +2903,7 @@ public object Postgresql { get; set; } postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2899,7 +2917,7 @@ public object Redis { get; set; } redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2913,7 +2931,7 @@ public object RedisElasticache { get; set; } redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2927,7 +2945,7 @@ public object Redshift { get; set; } redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2941,7 +2959,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2955,7 +2973,7 @@ public object Snowflake { get; set; } snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3015,7 +3033,7 @@ public string[] Hosts { get; set; } A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3029,7 +3047,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3043,7 +3061,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3057,7 +3075,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3071,7 +3089,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3087,7 +3105,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3101,7 +3119,7 @@ public string BucketName { get; set; } Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3115,7 +3133,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3129,7 +3147,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3145,7 +3163,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3159,7 +3177,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3173,7 +3191,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3187,7 +3205,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3201,7 +3219,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3265,7 +3283,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3279,7 +3297,7 @@ public string Password { get; set; } The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3293,7 +3311,7 @@ public string Url { get; set; } The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3307,7 +3325,7 @@ public string Username { get; set; } The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3321,7 +3339,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3335,7 +3353,7 @@ public string CaCert { get; set; } The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3349,7 +3367,7 @@ public string CaPath { get; set; } The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3363,7 +3381,7 @@ public string ClientCert { get; set; } The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3377,7 +3395,7 @@ public string ClientKey { get; set; } The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3391,7 +3409,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3405,7 +3423,7 @@ public object Insecure { get; set; } Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3421,7 +3439,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3435,7 +3453,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3449,7 +3467,7 @@ public string TlsServerName { get; set; } This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3463,7 +3481,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3477,7 +3495,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3535,7 +3553,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3549,7 +3567,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3563,7 +3581,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3577,7 +3595,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3591,7 +3609,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3605,7 +3623,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3619,7 +3637,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3633,7 +3651,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3647,7 +3665,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3663,7 +3681,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3677,7 +3695,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3691,7 +3709,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3705,7 +3723,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3769,7 +3787,7 @@ public string Host { get; set; } Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3783,7 +3801,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3797,7 +3815,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3811,7 +3829,7 @@ public string Username { get; set; } Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3825,7 +3843,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3839,7 +3857,7 @@ public double ConnectTimeout { get; set; } The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3853,7 +3871,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3867,7 +3885,7 @@ public object InsecureTls { get; set; } Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3883,7 +3901,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3899,7 +3917,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3915,7 +3933,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3929,7 +3947,7 @@ public double Port { get; set; } The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3943,7 +3961,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3957,7 +3975,7 @@ public object Tls { get; set; } Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3971,7 +3989,7 @@ public string UsernameTemplate { get; set; } Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3985,7 +4003,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4043,7 +4061,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4057,7 +4075,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4071,7 +4089,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4085,7 +4103,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4099,7 +4117,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4113,7 +4131,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4127,7 +4145,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4141,7 +4159,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4157,7 +4175,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4171,7 +4189,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4185,7 +4203,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4199,7 +4217,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4213,7 +4231,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4263,7 +4281,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4277,7 +4295,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4291,7 +4309,7 @@ public string ProjectId { get; set; } The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4305,7 +4323,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4319,7 +4337,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4333,7 +4351,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4349,7 +4367,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4363,7 +4381,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4377,7 +4395,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4439,7 +4457,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4453,7 +4471,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4467,7 +4485,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4481,7 +4499,7 @@ public object ContainedDb { get; set; } Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4495,7 +4513,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4509,7 +4527,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4523,7 +4541,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4537,7 +4555,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4551,7 +4569,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4565,7 +4583,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4581,7 +4599,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4595,7 +4613,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4609,7 +4627,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4623,7 +4641,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4637,7 +4655,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4703,7 +4721,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4717,7 +4735,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4731,7 +4749,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4745,7 +4763,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4759,7 +4777,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4773,7 +4791,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4787,7 +4805,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4801,7 +4819,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4815,7 +4833,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4831,7 +4849,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4845,7 +4863,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4859,7 +4877,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4873,7 +4891,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4889,7 +4907,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4903,7 +4921,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4917,7 +4935,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4931,7 +4949,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4997,7 +5015,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5011,7 +5029,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5025,7 +5043,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5039,7 +5057,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5053,7 +5071,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5067,7 +5085,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5081,7 +5099,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5095,7 +5113,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5109,7 +5127,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5125,7 +5143,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5139,7 +5157,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5153,7 +5171,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5167,7 +5185,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5183,7 +5201,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5197,7 +5215,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5211,7 +5229,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5225,7 +5243,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5291,7 +5309,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5305,7 +5323,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5319,7 +5337,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5333,7 +5351,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5347,7 +5365,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5361,7 +5379,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5375,7 +5393,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5389,7 +5407,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5403,7 +5421,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5419,7 +5437,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5433,7 +5451,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5447,7 +5465,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5461,7 +5479,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5477,7 +5495,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5491,7 +5509,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5505,7 +5523,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5519,7 +5537,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5585,7 +5603,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5599,7 +5617,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5613,7 +5631,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5627,7 +5645,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5641,7 +5659,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5655,7 +5673,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5669,7 +5687,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5683,7 +5701,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5697,7 +5715,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5713,7 +5731,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5727,7 +5745,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5741,7 +5759,7 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5755,7 +5773,7 @@ public string TlsCa { get; set; } x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5771,7 +5789,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5785,7 +5803,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5799,7 +5817,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5813,7 +5831,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5875,7 +5893,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5889,7 +5907,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5903,7 +5921,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5917,7 +5935,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5931,7 +5949,7 @@ public object DisconnectSessions { get; set; } Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5945,7 +5963,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5959,7 +5977,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5973,7 +5991,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5987,7 +6005,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6003,7 +6021,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6017,7 +6035,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6031,7 +6049,7 @@ public object SplitStatements { get; set; } Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6045,7 +6063,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6059,7 +6077,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6073,7 +6091,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6096,8 +6114,12 @@ new DatabaseSecretsMountPostgresql { double MaxOpenConnections = null, string Password = null, string PluginName = null, + string PrivateKey = null, string[] RootRotationStatements = null, + object SelfManaged = null, string ServiceAccountJson = null, + string TlsCa = null, + string TlsCertificate = null, string Username = null, string UsernameTemplate = null, object VerifyConnection = null @@ -6119,8 +6141,12 @@ new DatabaseSecretsMountPostgresql { | MaxOpenConnections | double | Maximum number of open connections to the database. | | Password | string | The root credential password used in the connection URL. | | PluginName | string | Specifies the name of the plugin to use for this connection. | +| PrivateKey | string | The secret key used for the x509 client certificate. Must be PEM encoded. | | RootRotationStatements | string[] | A list of database statements to be executed to rotate the root user's credentials. | +| SelfManaged | object | If set, allows onboarding static roles with a rootless connection configuration. | | ServiceAccountJson | string | A JSON encoded credential for use with IAM authorization. | +| TlsCa | string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| TlsCertificate | string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | Username | string | The root credential username used in the connection URL. | | UsernameTemplate | string | Username generation template. | | VerifyConnection | object | Specifies if the connection is verified during initial configuration. | @@ -6137,7 +6163,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6151,7 +6177,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6165,7 +6191,7 @@ public string AuthType { get; set; } Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6179,7 +6205,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6193,7 +6219,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6207,7 +6233,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6221,7 +6247,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6235,7 +6261,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6249,7 +6275,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6263,7 +6289,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6279,7 +6305,21 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + +--- + +##### `PrivateKey`Optional + +```csharp +public string PrivateKey { get; set; } +``` + +- *Type:* string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -6293,7 +6333,21 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `SelfManaged`Optional + +```csharp +public object SelfManaged { get; set; } +``` + +- *Type:* object + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed} --- @@ -6307,7 +6361,35 @@ public string ServiceAccountJson { get; set; } A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + +--- + +##### `TlsCa`Optional + +```csharp +public string TlsCa { get; set; } +``` + +- *Type:* string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + +--- + +##### `TlsCertificate`Optional + +```csharp +public string TlsCertificate { get; set; } +``` + +- *Type:* string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate} --- @@ -6321,7 +6403,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6335,7 +6417,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6349,7 +6431,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6407,7 +6489,7 @@ public string Host { get; set; } Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6421,7 +6503,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6435,7 +6517,7 @@ public string Password { get; set; } Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6449,7 +6531,7 @@ public string Username { get; set; } Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6463,7 +6545,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6477,7 +6559,7 @@ public string CaCert { get; set; } The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6491,7 +6573,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6505,7 +6587,7 @@ public object InsecureTls { get; set; } Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6521,7 +6603,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6535,7 +6617,7 @@ public double Port { get; set; } The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6549,7 +6631,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6563,7 +6645,7 @@ public object Tls { get; set; } Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6577,7 +6659,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6629,7 +6711,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6643,7 +6725,7 @@ public string Url { get; set; } The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6657,7 +6739,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6671,7 +6753,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6687,7 +6769,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6703,7 +6785,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6719,7 +6801,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6733,7 +6815,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6749,7 +6831,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6763,7 +6845,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6823,7 +6905,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6837,7 +6919,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6851,7 +6933,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6865,7 +6947,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6879,7 +6961,7 @@ public object DisableEscaping { get; set; } Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6893,7 +6975,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6907,7 +6989,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6921,7 +7003,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6935,7 +7017,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6951,7 +7033,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6965,7 +7047,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6979,7 +7061,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6993,7 +7075,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7007,7 +7089,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7065,7 +7147,7 @@ public string Name { get; set; } Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7079,7 +7161,7 @@ public string[] AllowedRoles { get; set; } A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7093,7 +7175,7 @@ public string ConnectionUrl { get; set; } Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7107,7 +7189,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7121,7 +7203,7 @@ public double MaxConnectionLifetime { get; set; } Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7135,7 +7217,7 @@ public double MaxIdleConnections { get; set; } Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7149,7 +7231,7 @@ public double MaxOpenConnections { get; set; } Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7163,7 +7245,7 @@ public string Password { get; set; } The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7179,7 +7261,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7193,7 +7275,7 @@ public string[] RootRotationStatements { get; set; } A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7207,7 +7289,7 @@ public string Username { get; set; } The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7221,7 +7303,7 @@ public string UsernameTemplate { get; set; } Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7235,7 +7317,7 @@ public object VerifyConnection { get; set; } Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7481,6 +7563,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | ResetPort | *No description.* | | ResetProtocolVersion | *No description.* | | ResetRootRotationStatements | *No description.* | +| ResetSkipVerification | *No description.* | | ResetTls | *No description.* | | ResetUsername | *No description.* | | ResetVerifyConnection | *No description.* | @@ -7709,6 +7792,12 @@ private void ResetProtocolVersion() private void ResetRootRotationStatements() ``` +##### `ResetSkipVerification` + +```csharp +private void ResetSkipVerification() +``` + ##### `ResetTls` ```csharp @@ -7747,6 +7836,7 @@ private void ResetVerifyConnection() | PortInput | double | *No description.* | | ProtocolVersionInput | double | *No description.* | | RootRotationStatementsInput | string[] | *No description.* | +| SkipVerificationInput | object | *No description.* | | TlsInput | object | *No description.* | | UsernameInput | string | *No description.* | | VerifyConnectionInput | object | *No description.* | @@ -7763,6 +7853,7 @@ private void ResetVerifyConnection() | Port | double | *No description.* | | ProtocolVersion | double | *No description.* | | RootRotationStatements | string[] | *No description.* | +| SkipVerification | object | *No description.* | | Tls | object | *No description.* | | Username | string | *No description.* | | VerifyConnection | object | *No description.* | @@ -7924,6 +8015,16 @@ public string[] RootRotationStatementsInput { get; } --- +##### `SkipVerificationInput`Optional + +```csharp +public object SkipVerificationInput { get; } +``` + +- *Type:* object + +--- + ##### `TlsInput`Optional ```csharp @@ -8084,6 +8185,16 @@ public string[] RootRotationStatements { get; } --- +##### `SkipVerification`Required + +```csharp +public object SkipVerification { get; } +``` + +- *Type:* object + +--- + ##### `Tls`Required ```csharp @@ -18510,8 +18621,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | ResetMaxOpenConnections | *No description.* | | ResetPassword | *No description.* | | ResetPluginName | *No description.* | +| ResetPrivateKey | *No description.* | | ResetRootRotationStatements | *No description.* | +| ResetSelfManaged | *No description.* | | ResetServiceAccountJson | *No description.* | +| ResetTlsCa | *No description.* | +| ResetTlsCertificate | *No description.* | | ResetUsername | *No description.* | | ResetUsernameTemplate | *No description.* | | ResetVerifyConnection | *No description.* | @@ -18728,18 +18843,42 @@ private void ResetPassword() private void ResetPluginName() ``` +##### `ResetPrivateKey` + +```csharp +private void ResetPrivateKey() +``` + ##### `ResetRootRotationStatements` ```csharp private void ResetRootRotationStatements() ``` +##### `ResetSelfManaged` + +```csharp +private void ResetSelfManaged() +``` + ##### `ResetServiceAccountJson` ```csharp private void ResetServiceAccountJson() ``` +##### `ResetTlsCa` + +```csharp +private void ResetTlsCa() +``` + +##### `ResetTlsCertificate` + +```csharp +private void ResetTlsCertificate() +``` + ##### `ResetUsername` ```csharp @@ -18776,8 +18915,12 @@ private void ResetVerifyConnection() | NameInput | string | *No description.* | | PasswordInput | string | *No description.* | | PluginNameInput | string | *No description.* | +| PrivateKeyInput | string | *No description.* | | RootRotationStatementsInput | string[] | *No description.* | +| SelfManagedInput | object | *No description.* | | ServiceAccountJsonInput | string | *No description.* | +| TlsCaInput | string | *No description.* | +| TlsCertificateInput | string | *No description.* | | UsernameInput | string | *No description.* | | UsernameTemplateInput | string | *No description.* | | VerifyConnectionInput | object | *No description.* | @@ -18792,8 +18935,12 @@ private void ResetVerifyConnection() | Name | string | *No description.* | | Password | string | *No description.* | | PluginName | string | *No description.* | +| PrivateKey | string | *No description.* | | RootRotationStatements | string[] | *No description.* | +| SelfManaged | object | *No description.* | | ServiceAccountJson | string | *No description.* | +| TlsCa | string | *No description.* | +| TlsCertificate | string | *No description.* | | Username | string | *No description.* | | UsernameTemplate | string | *No description.* | | VerifyConnection | object | *No description.* | @@ -18935,6 +19082,16 @@ public string PluginNameInput { get; } --- +##### `PrivateKeyInput`Optional + +```csharp +public string PrivateKeyInput { get; } +``` + +- *Type:* string + +--- + ##### `RootRotationStatementsInput`Optional ```csharp @@ -18945,6 +19102,16 @@ public string[] RootRotationStatementsInput { get; } --- +##### `SelfManagedInput`Optional + +```csharp +public object SelfManagedInput { get; } +``` + +- *Type:* object + +--- + ##### `ServiceAccountJsonInput`Optional ```csharp @@ -18955,6 +19122,26 @@ public string ServiceAccountJsonInput { get; } --- +##### `TlsCaInput`Optional + +```csharp +public string TlsCaInput { get; } +``` + +- *Type:* string + +--- + +##### `TlsCertificateInput`Optional + +```csharp +public string TlsCertificateInput { get; } +``` + +- *Type:* string + +--- + ##### `UsernameInput`Optional ```csharp @@ -19095,6 +19282,16 @@ public string PluginName { get; } --- +##### `PrivateKey`Required + +```csharp +public string PrivateKey { get; } +``` + +- *Type:* string + +--- + ##### `RootRotationStatements`Required ```csharp @@ -19105,6 +19302,16 @@ public string[] RootRotationStatements { get; } --- +##### `SelfManaged`Required + +```csharp +public object SelfManaged { get; } +``` + +- *Type:* object + +--- + ##### `ServiceAccountJson`Required ```csharp @@ -19115,6 +19322,26 @@ public string ServiceAccountJson { get; } --- +##### `TlsCa`Required + +```csharp +public string TlsCa { get; } +``` + +- *Type:* string + +--- + +##### `TlsCertificate`Required + +```csharp +public string TlsCertificate { get; } +``` + +- *Type:* string + +--- + ##### `Username`Required ```csharp diff --git a/docs/databaseSecretsMount.go.md b/docs/databaseSecretsMount.go.md index 31390455..5fa3262a 100644 --- a/docs/databaseSecretsMount.go.md +++ b/docs/databaseSecretsMount.go.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2005,6 +2005,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" Port: *f64, ProtocolVersion: *f64, RootRotationStatements: *[]*string, + SkipVerification: interface{}, Tls: interface{}, Username: *string, VerifyConnection: interface{}, @@ -2028,6 +2029,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" | Port | *f64 | The transport port to use to connect to Cassandra. | | ProtocolVersion | *f64 | The CQL protocol version to use. | | RootRotationStatements | *[]*string | A list of database statements to be executed to rotate the root user's credentials. | +| SkipVerification | interface{} | Skip permissions checks when a connection to Cassandra is first created. | | Tls | interface{} | Whether to use TLS when connecting to Cassandra. | | Username | *string | The username to use when authenticating with Cassandra. | | VerifyConnection | interface{} | Specifies if the connection is verified during initial configuration. | @@ -2044,7 +2046,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2058,7 +2060,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2072,7 +2074,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2086,7 +2088,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2100,7 +2102,7 @@ Hosts *[]*string Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2114,7 +2116,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2128,7 +2130,7 @@ Password *string The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2144,7 +2146,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2160,7 +2162,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2176,7 +2178,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2190,7 +2192,7 @@ Port *f64 The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2204,7 +2206,7 @@ ProtocolVersion *f64 The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2218,7 +2220,23 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `SkipVerification`Optional + +```go +SkipVerification interface{} +``` + +- *Type:* interface{} + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification} --- @@ -2232,7 +2250,7 @@ Tls interface{} Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2246,7 +2264,7 @@ Username *string The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2260,7 +2278,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2343,7 +2361,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" | Elasticsearch | interface{} | elasticsearch block. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | | Hana | interface{} | hana block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | IdentityTokenKey | *string | The key to use for signing plugin workload identity tokens. | | Influxdb | interface{} | influxdb block. | | ListingVisibility | *string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -2450,7 +2468,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2464,7 +2482,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2478,7 +2496,7 @@ AllowedResponseHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -2492,7 +2510,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2506,7 +2524,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2520,7 +2538,7 @@ Cassandra interface{} cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2534,7 +2552,7 @@ Couchbase interface{} couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2548,7 +2566,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2562,7 +2580,7 @@ DelegatedAuthAccessors *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -2576,7 +2594,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2590,7 +2608,7 @@ Elasticsearch interface{} elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2604,7 +2622,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2618,7 +2636,7 @@ Hana interface{} hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2630,7 +2648,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2647,7 +2665,7 @@ IdentityTokenKey *string The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -2661,7 +2679,7 @@ Influxdb interface{} influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2675,7 +2693,7 @@ ListingVisibility *string Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -2689,7 +2707,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2703,7 +2721,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2717,7 +2735,7 @@ Mongodb interface{} mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2731,7 +2749,7 @@ Mongodbatlas interface{} mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2745,7 +2763,7 @@ Mssql interface{} mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2759,7 +2777,7 @@ Mysql interface{} mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2773,7 +2791,7 @@ MysqlAurora interface{} mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2787,7 +2805,7 @@ MysqlLegacy interface{} mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2801,7 +2819,7 @@ MysqlRds interface{} mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2815,7 +2833,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2829,7 +2847,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2843,7 +2861,7 @@ Oracle interface{} oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2857,7 +2875,7 @@ PassthroughRequestHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -2871,7 +2889,7 @@ PluginVersion *string Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -2885,7 +2903,7 @@ Postgresql interface{} postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2899,7 +2917,7 @@ Redis interface{} redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2913,7 +2931,7 @@ RedisElasticache interface{} redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2927,7 +2945,7 @@ Redshift interface{} redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2941,7 +2959,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2955,7 +2973,7 @@ Snowflake interface{} snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3015,7 +3033,7 @@ Hosts *[]*string A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3029,7 +3047,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3043,7 +3061,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3057,7 +3075,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3071,7 +3089,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3087,7 +3105,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3101,7 +3119,7 @@ BucketName *string Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3115,7 +3133,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3129,7 +3147,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3145,7 +3163,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3159,7 +3177,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3173,7 +3191,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3187,7 +3205,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3201,7 +3219,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3265,7 +3283,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3279,7 +3297,7 @@ Password *string The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3293,7 +3311,7 @@ Url *string The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3307,7 +3325,7 @@ Username *string The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3321,7 +3339,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3335,7 +3353,7 @@ CaCert *string The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3349,7 +3367,7 @@ CaPath *string The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3363,7 +3381,7 @@ ClientCert *string The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3377,7 +3395,7 @@ ClientKey *string The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3391,7 +3409,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3405,7 +3423,7 @@ Insecure interface{} Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3421,7 +3439,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3435,7 +3453,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3449,7 +3467,7 @@ TlsServerName *string This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3463,7 +3481,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3477,7 +3495,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3535,7 +3553,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3549,7 +3567,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3563,7 +3581,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3577,7 +3595,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3591,7 +3609,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3605,7 +3623,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3619,7 +3637,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3633,7 +3651,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3647,7 +3665,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3663,7 +3681,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3677,7 +3695,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3691,7 +3709,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3705,7 +3723,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3769,7 +3787,7 @@ Host *string Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3783,7 +3801,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3797,7 +3815,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3811,7 +3829,7 @@ Username *string Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3825,7 +3843,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3839,7 +3857,7 @@ ConnectTimeout *f64 The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3853,7 +3871,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3867,7 +3885,7 @@ InsecureTls interface{} Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3883,7 +3901,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3899,7 +3917,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3915,7 +3933,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3929,7 +3947,7 @@ Port *f64 The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3943,7 +3961,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3957,7 +3975,7 @@ Tls interface{} Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3971,7 +3989,7 @@ UsernameTemplate *string Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3985,7 +4003,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4043,7 +4061,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4057,7 +4075,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4071,7 +4089,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4085,7 +4103,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4099,7 +4117,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4113,7 +4131,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4127,7 +4145,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4141,7 +4159,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4157,7 +4175,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4171,7 +4189,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4185,7 +4203,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4199,7 +4217,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4213,7 +4231,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4263,7 +4281,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4277,7 +4295,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4291,7 +4309,7 @@ ProjectId *string The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4305,7 +4323,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4319,7 +4337,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4333,7 +4351,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4349,7 +4367,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4363,7 +4381,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4377,7 +4395,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4439,7 +4457,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4453,7 +4471,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4467,7 +4485,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4481,7 +4499,7 @@ ContainedDb interface{} Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4495,7 +4513,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4509,7 +4527,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4523,7 +4541,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4537,7 +4555,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4551,7 +4569,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4565,7 +4583,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4581,7 +4599,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4595,7 +4613,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4609,7 +4627,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4623,7 +4641,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4637,7 +4655,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4703,7 +4721,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4717,7 +4735,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4731,7 +4749,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4745,7 +4763,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4759,7 +4777,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4773,7 +4791,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4787,7 +4805,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4801,7 +4819,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4815,7 +4833,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4831,7 +4849,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4845,7 +4863,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4859,7 +4877,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4873,7 +4891,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4889,7 +4907,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4903,7 +4921,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4917,7 +4935,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4931,7 +4949,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4997,7 +5015,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5011,7 +5029,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5025,7 +5043,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5039,7 +5057,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5053,7 +5071,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5067,7 +5085,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5081,7 +5099,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5095,7 +5113,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5109,7 +5127,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5125,7 +5143,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5139,7 +5157,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5153,7 +5171,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5167,7 +5185,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5183,7 +5201,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5197,7 +5215,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5211,7 +5229,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5225,7 +5243,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5291,7 +5309,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5305,7 +5323,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5319,7 +5337,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5333,7 +5351,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5347,7 +5365,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5361,7 +5379,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5375,7 +5393,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5389,7 +5407,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5403,7 +5421,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5419,7 +5437,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5433,7 +5451,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5447,7 +5465,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5461,7 +5479,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5477,7 +5495,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5491,7 +5509,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5505,7 +5523,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5519,7 +5537,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5585,7 +5603,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5599,7 +5617,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5613,7 +5631,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5627,7 +5645,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5641,7 +5659,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5655,7 +5673,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5669,7 +5687,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5683,7 +5701,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5697,7 +5715,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5713,7 +5731,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5727,7 +5745,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5741,7 +5759,7 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5755,7 +5773,7 @@ TlsCa *string x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5771,7 +5789,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5785,7 +5803,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5799,7 +5817,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5813,7 +5831,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5875,7 +5893,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5889,7 +5907,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5903,7 +5921,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5917,7 +5935,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5931,7 +5949,7 @@ DisconnectSessions interface{} Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5945,7 +5963,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5959,7 +5977,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5973,7 +5991,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5987,7 +6005,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6003,7 +6021,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6017,7 +6035,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6031,7 +6049,7 @@ SplitStatements interface{} Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6045,7 +6063,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6059,7 +6077,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6073,7 +6091,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6096,8 +6114,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" MaxOpenConnections: *f64, Password: *string, PluginName: *string, + PrivateKey: *string, RootRotationStatements: *[]*string, + SelfManaged: interface{}, ServiceAccountJson: *string, + TlsCa: *string, + TlsCertificate: *string, Username: *string, UsernameTemplate: *string, VerifyConnection: interface{}, @@ -6119,8 +6141,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/databasesecretsmount" | MaxOpenConnections | *f64 | Maximum number of open connections to the database. | | Password | *string | The root credential password used in the connection URL. | | PluginName | *string | Specifies the name of the plugin to use for this connection. | +| PrivateKey | *string | The secret key used for the x509 client certificate. Must be PEM encoded. | | RootRotationStatements | *[]*string | A list of database statements to be executed to rotate the root user's credentials. | +| SelfManaged | interface{} | If set, allows onboarding static roles with a rootless connection configuration. | | ServiceAccountJson | *string | A JSON encoded credential for use with IAM authorization. | +| TlsCa | *string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| TlsCertificate | *string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | Username | *string | The root credential username used in the connection URL. | | UsernameTemplate | *string | Username generation template. | | VerifyConnection | interface{} | Specifies if the connection is verified during initial configuration. | @@ -6137,7 +6163,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6151,7 +6177,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6165,7 +6191,7 @@ AuthType *string Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6179,7 +6205,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6193,7 +6219,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6207,7 +6233,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6221,7 +6247,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6235,7 +6261,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6249,7 +6275,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6263,7 +6289,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6279,7 +6305,21 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + +--- + +##### `PrivateKey`Optional + +```go +PrivateKey *string +``` + +- *Type:* *string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -6293,7 +6333,21 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `SelfManaged`Optional + +```go +SelfManaged interface{} +``` + +- *Type:* interface{} + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed} --- @@ -6307,7 +6361,35 @@ ServiceAccountJson *string A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + +--- + +##### `TlsCa`Optional + +```go +TlsCa *string +``` + +- *Type:* *string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + +--- + +##### `TlsCertificate`Optional + +```go +TlsCertificate *string +``` + +- *Type:* *string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate} --- @@ -6321,7 +6403,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6335,7 +6417,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6349,7 +6431,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6407,7 +6489,7 @@ Host *string Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6421,7 +6503,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6435,7 +6517,7 @@ Password *string Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6449,7 +6531,7 @@ Username *string Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6463,7 +6545,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6477,7 +6559,7 @@ CaCert *string The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6491,7 +6573,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6505,7 +6587,7 @@ InsecureTls interface{} Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6521,7 +6603,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6535,7 +6617,7 @@ Port *f64 The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6549,7 +6631,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6563,7 +6645,7 @@ Tls interface{} Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6577,7 +6659,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6629,7 +6711,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6643,7 +6725,7 @@ Url *string The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6657,7 +6739,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6671,7 +6753,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6687,7 +6769,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6703,7 +6785,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6719,7 +6801,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6733,7 +6815,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6749,7 +6831,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6763,7 +6845,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6823,7 +6905,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6837,7 +6919,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6851,7 +6933,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6865,7 +6947,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6879,7 +6961,7 @@ DisableEscaping interface{} Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6893,7 +6975,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6907,7 +6989,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6921,7 +7003,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6935,7 +7017,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6951,7 +7033,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6965,7 +7047,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6979,7 +7061,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6993,7 +7075,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7007,7 +7089,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7065,7 +7147,7 @@ Name *string Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7079,7 +7161,7 @@ AllowedRoles *[]*string A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7093,7 +7175,7 @@ ConnectionUrl *string Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7107,7 +7189,7 @@ Data *map[string]*string A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7121,7 +7203,7 @@ MaxConnectionLifetime *f64 Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7135,7 +7217,7 @@ MaxIdleConnections *f64 Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7149,7 +7231,7 @@ MaxOpenConnections *f64 Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7163,7 +7245,7 @@ Password *string The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7179,7 +7261,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7193,7 +7275,7 @@ RootRotationStatements *[]*string A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7207,7 +7289,7 @@ Username *string The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7221,7 +7303,7 @@ UsernameTemplate *string Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7235,7 +7317,7 @@ VerifyConnection interface{} Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7481,6 +7563,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | ResetPort | *No description.* | | ResetProtocolVersion | *No description.* | | ResetRootRotationStatements | *No description.* | +| ResetSkipVerification | *No description.* | | ResetTls | *No description.* | | ResetUsername | *No description.* | | ResetVerifyConnection | *No description.* | @@ -7709,6 +7792,12 @@ func ResetProtocolVersion() func ResetRootRotationStatements() ``` +##### `ResetSkipVerification` + +```go +func ResetSkipVerification() +``` + ##### `ResetTls` ```go @@ -7747,6 +7836,7 @@ func ResetVerifyConnection() | PortInput | *f64 | *No description.* | | ProtocolVersionInput | *f64 | *No description.* | | RootRotationStatementsInput | *[]*string | *No description.* | +| SkipVerificationInput | interface{} | *No description.* | | TlsInput | interface{} | *No description.* | | UsernameInput | *string | *No description.* | | VerifyConnectionInput | interface{} | *No description.* | @@ -7763,6 +7853,7 @@ func ResetVerifyConnection() | Port | *f64 | *No description.* | | ProtocolVersion | *f64 | *No description.* | | RootRotationStatements | *[]*string | *No description.* | +| SkipVerification | interface{} | *No description.* | | Tls | interface{} | *No description.* | | Username | *string | *No description.* | | VerifyConnection | interface{} | *No description.* | @@ -7924,6 +8015,16 @@ func RootRotationStatementsInput() *[]*string --- +##### `SkipVerificationInput`Optional + +```go +func SkipVerificationInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `TlsInput`Optional ```go @@ -8084,6 +8185,16 @@ func RootRotationStatements() *[]*string --- +##### `SkipVerification`Required + +```go +func SkipVerification() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Tls`Required ```go @@ -18510,8 +18621,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | ResetMaxOpenConnections | *No description.* | | ResetPassword | *No description.* | | ResetPluginName | *No description.* | +| ResetPrivateKey | *No description.* | | ResetRootRotationStatements | *No description.* | +| ResetSelfManaged | *No description.* | | ResetServiceAccountJson | *No description.* | +| ResetTlsCa | *No description.* | +| ResetTlsCertificate | *No description.* | | ResetUsername | *No description.* | | ResetUsernameTemplate | *No description.* | | ResetVerifyConnection | *No description.* | @@ -18728,18 +18843,42 @@ func ResetPassword() func ResetPluginName() ``` +##### `ResetPrivateKey` + +```go +func ResetPrivateKey() +``` + ##### `ResetRootRotationStatements` ```go func ResetRootRotationStatements() ``` +##### `ResetSelfManaged` + +```go +func ResetSelfManaged() +``` + ##### `ResetServiceAccountJson` ```go func ResetServiceAccountJson() ``` +##### `ResetTlsCa` + +```go +func ResetTlsCa() +``` + +##### `ResetTlsCertificate` + +```go +func ResetTlsCertificate() +``` + ##### `ResetUsername` ```go @@ -18776,8 +18915,12 @@ func ResetVerifyConnection() | NameInput | *string | *No description.* | | PasswordInput | *string | *No description.* | | PluginNameInput | *string | *No description.* | +| PrivateKeyInput | *string | *No description.* | | RootRotationStatementsInput | *[]*string | *No description.* | +| SelfManagedInput | interface{} | *No description.* | | ServiceAccountJsonInput | *string | *No description.* | +| TlsCaInput | *string | *No description.* | +| TlsCertificateInput | *string | *No description.* | | UsernameInput | *string | *No description.* | | UsernameTemplateInput | *string | *No description.* | | VerifyConnectionInput | interface{} | *No description.* | @@ -18792,8 +18935,12 @@ func ResetVerifyConnection() | Name | *string | *No description.* | | Password | *string | *No description.* | | PluginName | *string | *No description.* | +| PrivateKey | *string | *No description.* | | RootRotationStatements | *[]*string | *No description.* | +| SelfManaged | interface{} | *No description.* | | ServiceAccountJson | *string | *No description.* | +| TlsCa | *string | *No description.* | +| TlsCertificate | *string | *No description.* | | Username | *string | *No description.* | | UsernameTemplate | *string | *No description.* | | VerifyConnection | interface{} | *No description.* | @@ -18935,6 +19082,16 @@ func PluginNameInput() *string --- +##### `PrivateKeyInput`Optional + +```go +func PrivateKeyInput() *string +``` + +- *Type:* *string + +--- + ##### `RootRotationStatementsInput`Optional ```go @@ -18945,6 +19102,16 @@ func RootRotationStatementsInput() *[]*string --- +##### `SelfManagedInput`Optional + +```go +func SelfManagedInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `ServiceAccountJsonInput`Optional ```go @@ -18955,6 +19122,26 @@ func ServiceAccountJsonInput() *string --- +##### `TlsCaInput`Optional + +```go +func TlsCaInput() *string +``` + +- *Type:* *string + +--- + +##### `TlsCertificateInput`Optional + +```go +func TlsCertificateInput() *string +``` + +- *Type:* *string + +--- + ##### `UsernameInput`Optional ```go @@ -19095,6 +19282,16 @@ func PluginName() *string --- +##### `PrivateKey`Required + +```go +func PrivateKey() *string +``` + +- *Type:* *string + +--- + ##### `RootRotationStatements`Required ```go @@ -19105,6 +19302,16 @@ func RootRotationStatements() *[]*string --- +##### `SelfManaged`Required + +```go +func SelfManaged() interface{} +``` + +- *Type:* interface{} + +--- + ##### `ServiceAccountJson`Required ```go @@ -19115,6 +19322,26 @@ func ServiceAccountJson() *string --- +##### `TlsCa`Required + +```go +func TlsCa() *string +``` + +- *Type:* *string + +--- + +##### `TlsCertificate`Required + +```go +func TlsCertificate() *string +``` + +- *Type:* *string + +--- + ##### `Username`Required ```go diff --git a/docs/databaseSecretsMount.java.md b/docs/databaseSecretsMount.java.md index 463cb952..84386fde 100644 --- a/docs/databaseSecretsMount.java.md +++ b/docs/databaseSecretsMount.java.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -108,7 +108,7 @@ DatabaseSecretsMount.Builder.create(Construct scope, java.lang.String id) | elasticsearch | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch> | elasticsearch block. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana> | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | influxdb | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb> | influxdb block. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -201,7 +201,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -321,7 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -342,7 +342,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -362,7 +362,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -372,7 +372,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -382,7 +382,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -392,7 +392,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -402,7 +402,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -412,7 +412,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -422,7 +422,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -432,7 +432,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -442,7 +442,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -452,7 +452,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -462,7 +462,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -472,7 +472,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -482,7 +482,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -492,7 +492,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -502,7 +502,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -512,7 +512,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -522,7 +522,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -532,7 +532,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -542,7 +542,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -552,7 +552,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -562,7 +562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -1475,7 +1475,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2528,6 +2528,8 @@ DatabaseSecretsMountCassandra.builder() // .port(java.lang.Number) // .protocolVersion(java.lang.Number) // .rootRotationStatements(java.util.List) +// .skipVerification(java.lang.Boolean) +// .skipVerification(IResolvable) // .tls(java.lang.Boolean) // .tls(IResolvable) // .username(java.lang.String) @@ -2553,6 +2555,7 @@ DatabaseSecretsMountCassandra.builder() | port | java.lang.Number | The transport port to use to connect to Cassandra. | | protocolVersion | java.lang.Number | The CQL protocol version to use. | | rootRotationStatements | java.util.List | A list of database statements to be executed to rotate the root user's credentials. | +| skipVerification | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip permissions checks when a connection to Cassandra is first created. | | tls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether to use TLS when connecting to Cassandra. | | username | java.lang.String | The username to use when authenticating with Cassandra. | | verifyConnection | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the connection is verified during initial configuration. | @@ -2569,7 +2572,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2583,7 +2586,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2597,7 +2600,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2611,7 +2614,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2625,7 +2628,7 @@ public java.util.List getHosts(); Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2639,7 +2642,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2653,7 +2656,7 @@ public java.lang.String getPassword(); The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2669,7 +2672,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2685,7 +2688,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2701,7 +2704,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2715,7 +2718,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2729,7 +2732,7 @@ public java.lang.Number getProtocolVersion(); The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2743,7 +2746,23 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `skipVerification`Optional + +```java +public java.lang.Object getSkipVerification(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification} --- @@ -2757,7 +2776,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2771,7 +2790,7 @@ public java.lang.String getUsername(); The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2785,7 +2804,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2893,7 +2912,7 @@ DatabaseSecretsMountConfig.builder() | elasticsearch | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountElasticsearch> | elasticsearch block. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountHana> | hana block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | influxdb | com.hashicorp.cdktf.IResolvable OR java.util.List<DatabaseSecretsMountInfluxdb> | influxdb block. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -3000,7 +3019,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -3014,7 +3033,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -3028,7 +3047,7 @@ public java.util.List getAllowedResponseHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -3042,7 +3061,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -3056,7 +3075,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -3070,7 +3089,7 @@ public java.lang.Object getCassandra(); cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -3084,7 +3103,7 @@ public java.lang.Object getCouchbase(); couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -3098,7 +3117,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -3112,7 +3131,7 @@ public java.util.List getDelegatedAuthAccessors(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -3126,7 +3145,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -3140,7 +3159,7 @@ public java.lang.Object getElasticsearch(); elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -3154,7 +3173,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -3168,7 +3187,7 @@ public java.lang.Object getHana(); hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -3180,7 +3199,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -3197,7 +3216,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -3211,7 +3230,7 @@ public java.lang.Object getInfluxdb(); influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -3225,7 +3244,7 @@ public java.lang.String getListingVisibility(); Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -3239,7 +3258,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -3253,7 +3272,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -3267,7 +3286,7 @@ public java.lang.Object getMongodb(); mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -3281,7 +3300,7 @@ public java.lang.Object getMongodbatlas(); mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -3295,7 +3314,7 @@ public java.lang.Object getMssql(); mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -3309,7 +3328,7 @@ public java.lang.Object getMysql(); mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -3323,7 +3342,7 @@ public java.lang.Object getMysqlAurora(); mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -3337,7 +3356,7 @@ public java.lang.Object getMysqlLegacy(); mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -3351,7 +3370,7 @@ public java.lang.Object getMysqlRds(); mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -3365,7 +3384,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -3379,7 +3398,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -3393,7 +3412,7 @@ public java.lang.Object getOracle(); oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -3407,7 +3426,7 @@ public java.util.List getPassthroughRequestHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -3421,7 +3440,7 @@ public java.lang.String getPluginVersion(); Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -3435,7 +3454,7 @@ public java.lang.Object getPostgresql(); postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -3449,7 +3468,7 @@ public java.lang.Object getRedis(); redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -3463,7 +3482,7 @@ public java.lang.Object getRedisElasticache(); redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -3477,7 +3496,7 @@ public java.lang.Object getRedshift(); redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -3491,7 +3510,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -3505,7 +3524,7 @@ public java.lang.Object getSnowflake(); snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3568,7 +3587,7 @@ public java.util.List getHosts(); A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3582,7 +3601,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3596,7 +3615,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3610,7 +3629,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3624,7 +3643,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3640,7 +3659,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3654,7 +3673,7 @@ public java.lang.String getBucketName(); Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3668,7 +3687,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3682,7 +3701,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3698,7 +3717,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3712,7 +3731,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3726,7 +3745,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3740,7 +3759,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3754,7 +3773,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3820,7 +3839,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3834,7 +3853,7 @@ public java.lang.String getPassword(); The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3848,7 +3867,7 @@ public java.lang.String getUrl(); The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3862,7 +3881,7 @@ public java.lang.String getUsername(); The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3876,7 +3895,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3890,7 +3909,7 @@ public java.lang.String getCaCert(); The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3904,7 +3923,7 @@ public java.lang.String getCaPath(); The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3918,7 +3937,7 @@ public java.lang.String getClientCert(); The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3932,7 +3951,7 @@ public java.lang.String getClientKey(); The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3946,7 +3965,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3960,7 +3979,7 @@ public java.lang.Object getInsecure(); Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3976,7 +3995,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3990,7 +4009,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4004,7 +4023,7 @@ public java.lang.String getTlsServerName(); This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -4018,7 +4037,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4032,7 +4051,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4092,7 +4111,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4106,7 +4125,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4120,7 +4139,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4134,7 +4153,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4148,7 +4167,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4162,7 +4181,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4176,7 +4195,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4190,7 +4209,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4204,7 +4223,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4220,7 +4239,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4234,7 +4253,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4248,7 +4267,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4262,7 +4281,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4329,7 +4348,7 @@ public java.lang.String getHost(); Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -4343,7 +4362,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4357,7 +4376,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4371,7 +4390,7 @@ public java.lang.String getUsername(); Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4385,7 +4404,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4399,7 +4418,7 @@ public java.lang.Number getConnectTimeout(); The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -4413,7 +4432,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4427,7 +4446,7 @@ public java.lang.Object getInsecureTls(); Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -4443,7 +4462,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -4459,7 +4478,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -4475,7 +4494,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4489,7 +4508,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -4503,7 +4522,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4517,7 +4536,7 @@ public java.lang.Object getTls(); Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -4531,7 +4550,7 @@ public java.lang.String getUsernameTemplate(); Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4545,7 +4564,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4604,7 +4623,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4618,7 +4637,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4632,7 +4651,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4646,7 +4665,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4660,7 +4679,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4674,7 +4693,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4688,7 +4707,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4702,7 +4721,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4718,7 +4737,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4732,7 +4751,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4746,7 +4765,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4760,7 +4779,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4774,7 +4793,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4825,7 +4844,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4839,7 +4858,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4853,7 +4872,7 @@ public java.lang.String getProjectId(); The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4867,7 +4886,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4881,7 +4900,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4895,7 +4914,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4911,7 +4930,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4925,7 +4944,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4939,7 +4958,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5004,7 +5023,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5018,7 +5037,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5032,7 +5051,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5046,7 +5065,7 @@ public java.lang.Object getContainedDb(); Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -5060,7 +5079,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5074,7 +5093,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5088,7 +5107,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5102,7 +5121,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5116,7 +5135,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5130,7 +5149,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5146,7 +5165,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5160,7 +5179,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5174,7 +5193,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5188,7 +5207,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5202,7 +5221,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5269,7 +5288,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5283,7 +5302,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5297,7 +5316,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5311,7 +5330,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5325,7 +5344,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5339,7 +5358,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5353,7 +5372,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5367,7 +5386,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5381,7 +5400,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5397,7 +5416,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5411,7 +5430,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5425,7 +5444,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5439,7 +5458,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5455,7 +5474,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5469,7 +5488,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5483,7 +5502,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5497,7 +5516,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5564,7 +5583,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5578,7 +5597,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5592,7 +5611,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5606,7 +5625,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5620,7 +5639,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5634,7 +5653,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5648,7 +5667,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5662,7 +5681,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5676,7 +5695,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5692,7 +5711,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5706,7 +5725,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5720,7 +5739,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5734,7 +5753,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5750,7 +5769,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5764,7 +5783,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5778,7 +5797,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5792,7 +5811,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5859,7 +5878,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5873,7 +5892,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5887,7 +5906,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5901,7 +5920,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5915,7 +5934,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5929,7 +5948,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5943,7 +5962,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5957,7 +5976,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5971,7 +5990,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5987,7 +6006,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6001,7 +6020,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6015,7 +6034,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6029,7 +6048,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -6045,7 +6064,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6059,7 +6078,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6073,7 +6092,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6087,7 +6106,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6154,7 +6173,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6168,7 +6187,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6182,7 +6201,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6196,7 +6215,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6210,7 +6229,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6224,7 +6243,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6238,7 +6257,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6252,7 +6271,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6266,7 +6285,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6282,7 +6301,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6296,7 +6315,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6310,7 +6329,7 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6324,7 +6343,7 @@ public java.lang.String getTlsCa(); x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -6340,7 +6359,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6354,7 +6373,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6368,7 +6387,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6382,7 +6401,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6447,7 +6466,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6461,7 +6480,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6475,7 +6494,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6489,7 +6508,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6503,7 +6522,7 @@ public java.lang.Object getDisconnectSessions(); Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -6517,7 +6536,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6531,7 +6550,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6545,7 +6564,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6559,7 +6578,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6575,7 +6594,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6589,7 +6608,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6603,7 +6622,7 @@ public java.lang.Object getSplitStatements(); Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6617,7 +6636,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6631,7 +6650,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6645,7 +6664,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6669,8 +6688,13 @@ DatabaseSecretsMountPostgresql.builder() // .maxOpenConnections(java.lang.Number) // .password(java.lang.String) // .pluginName(java.lang.String) +// .privateKey(java.lang.String) // .rootRotationStatements(java.util.List) +// .selfManaged(java.lang.Boolean) +// .selfManaged(IResolvable) // .serviceAccountJson(java.lang.String) +// .tlsCa(java.lang.String) +// .tlsCertificate(java.lang.String) // .username(java.lang.String) // .usernameTemplate(java.lang.String) // .verifyConnection(java.lang.Boolean) @@ -6693,8 +6717,12 @@ DatabaseSecretsMountPostgresql.builder() | maxOpenConnections | java.lang.Number | Maximum number of open connections to the database. | | password | java.lang.String | The root credential password used in the connection URL. | | pluginName | java.lang.String | Specifies the name of the plugin to use for this connection. | +| privateKey | java.lang.String | The secret key used for the x509 client certificate. Must be PEM encoded. | | rootRotationStatements | java.util.List | A list of database statements to be executed to rotate the root user's credentials. | +| selfManaged | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, allows onboarding static roles with a rootless connection configuration. | | serviceAccountJson | java.lang.String | A JSON encoded credential for use with IAM authorization. | +| tlsCa | java.lang.String | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tlsCertificate | java.lang.String | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | java.lang.String | The root credential username used in the connection URL. | | usernameTemplate | java.lang.String | Username generation template. | | verifyConnection | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the connection is verified during initial configuration. | @@ -6711,7 +6739,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6725,7 +6753,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6739,7 +6767,7 @@ public java.lang.String getAuthType(); Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6753,7 +6781,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6767,7 +6795,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6781,7 +6809,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6795,7 +6823,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6809,7 +6837,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6823,7 +6851,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6837,7 +6865,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6853,7 +6881,21 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + +--- + +##### `privateKey`Optional + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -6867,7 +6909,21 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `selfManaged`Optional + +```java +public java.lang.Object getSelfManaged(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed} --- @@ -6881,7 +6937,35 @@ public java.lang.String getServiceAccountJson(); A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + +--- + +##### `tlsCa`Optional + +```java +public java.lang.String getTlsCa(); +``` + +- *Type:* java.lang.String + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + +--- + +##### `tlsCertificate`Optional + +```java +public java.lang.String getTlsCertificate(); +``` + +- *Type:* java.lang.String + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate} --- @@ -6895,7 +6979,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6909,7 +6993,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6923,7 +7007,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6984,7 +7068,7 @@ public java.lang.String getHost(); Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6998,7 +7082,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7012,7 +7096,7 @@ public java.lang.String getPassword(); Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7026,7 +7110,7 @@ public java.lang.String getUsername(); Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7040,7 +7124,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7054,7 +7138,7 @@ public java.lang.String getCaCert(); The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -7068,7 +7152,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7082,7 +7166,7 @@ public java.lang.Object getInsecureTls(); Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -7098,7 +7182,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7112,7 +7196,7 @@ public java.lang.Number getPort(); The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -7126,7 +7210,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7140,7 +7224,7 @@ public java.lang.Object getTls(); Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -7154,7 +7238,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7207,7 +7291,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7221,7 +7305,7 @@ public java.lang.String getUrl(); The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -7235,7 +7319,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7249,7 +7333,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7265,7 +7349,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7281,7 +7365,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7297,7 +7381,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -7311,7 +7395,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7327,7 +7411,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7341,7 +7425,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7403,7 +7487,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7417,7 +7501,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7431,7 +7515,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7445,7 +7529,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7459,7 +7543,7 @@ public java.lang.Object getDisableEscaping(); Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -7473,7 +7557,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7487,7 +7571,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7501,7 +7585,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7515,7 +7599,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7531,7 +7615,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7545,7 +7629,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7559,7 +7643,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7573,7 +7657,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7587,7 +7671,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7646,7 +7730,7 @@ public java.lang.String getName(); Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7660,7 +7744,7 @@ public java.util.List getAllowedRoles(); A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7674,7 +7758,7 @@ public java.lang.String getConnectionUrl(); Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7688,7 +7772,7 @@ public java.util.Map getData(); A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7702,7 +7786,7 @@ public java.lang.Number getMaxConnectionLifetime(); Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7716,7 +7800,7 @@ public java.lang.Number getMaxIdleConnections(); Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7730,7 +7814,7 @@ public java.lang.Number getMaxOpenConnections(); Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7744,7 +7828,7 @@ public java.lang.String getPassword(); The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7760,7 +7844,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7774,7 +7858,7 @@ public java.util.List getRootRotationStatements(); A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7788,7 +7872,7 @@ public java.lang.String getUsername(); The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7802,7 +7886,7 @@ public java.lang.String getUsernameTemplate(); Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7816,7 +7900,7 @@ public java.lang.Object getVerifyConnection(); Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -8062,6 +8146,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | resetPort | *No description.* | | resetProtocolVersion | *No description.* | | resetRootRotationStatements | *No description.* | +| resetSkipVerification | *No description.* | | resetTls | *No description.* | | resetUsername | *No description.* | | resetVerifyConnection | *No description.* | @@ -8290,6 +8375,12 @@ public void resetProtocolVersion() public void resetRootRotationStatements() ``` +##### `resetSkipVerification` + +```java +public void resetSkipVerification() +``` + ##### `resetTls` ```java @@ -8328,6 +8419,7 @@ public void resetVerifyConnection() | portInput | java.lang.Number | *No description.* | | protocolVersionInput | java.lang.Number | *No description.* | | rootRotationStatementsInput | java.util.List | *No description.* | +| skipVerificationInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | tlsInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | usernameInput | java.lang.String | *No description.* | | verifyConnectionInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -8344,6 +8436,7 @@ public void resetVerifyConnection() | port | java.lang.Number | *No description.* | | protocolVersion | java.lang.Number | *No description.* | | rootRotationStatements | java.util.List | *No description.* | +| skipVerification | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | tls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | username | java.lang.String | *No description.* | | verifyConnection | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -8505,6 +8598,16 @@ public java.util.List getRootRotationStatementsInput(); --- +##### `skipVerificationInput`Optional + +```java +public java.lang.Object getSkipVerificationInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `tlsInput`Optional ```java @@ -8665,6 +8768,16 @@ public java.util.List getRootRotationStatements(); --- +##### `skipVerification`Required + +```java +public java.lang.Object getSkipVerification(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `tls`Required ```java @@ -19091,8 +19204,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | resetMaxOpenConnections | *No description.* | | resetPassword | *No description.* | | resetPluginName | *No description.* | +| resetPrivateKey | *No description.* | | resetRootRotationStatements | *No description.* | +| resetSelfManaged | *No description.* | | resetServiceAccountJson | *No description.* | +| resetTlsCa | *No description.* | +| resetTlsCertificate | *No description.* | | resetUsername | *No description.* | | resetUsernameTemplate | *No description.* | | resetVerifyConnection | *No description.* | @@ -19309,18 +19426,42 @@ public void resetPassword() public void resetPluginName() ``` +##### `resetPrivateKey` + +```java +public void resetPrivateKey() +``` + ##### `resetRootRotationStatements` ```java public void resetRootRotationStatements() ``` +##### `resetSelfManaged` + +```java +public void resetSelfManaged() +``` + ##### `resetServiceAccountJson` ```java public void resetServiceAccountJson() ``` +##### `resetTlsCa` + +```java +public void resetTlsCa() +``` + +##### `resetTlsCertificate` + +```java +public void resetTlsCertificate() +``` + ##### `resetUsername` ```java @@ -19357,8 +19498,12 @@ public void resetVerifyConnection() | nameInput | java.lang.String | *No description.* | | passwordInput | java.lang.String | *No description.* | | pluginNameInput | java.lang.String | *No description.* | +| privateKeyInput | java.lang.String | *No description.* | | rootRotationStatementsInput | java.util.List | *No description.* | +| selfManagedInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | serviceAccountJsonInput | java.lang.String | *No description.* | +| tlsCaInput | java.lang.String | *No description.* | +| tlsCertificateInput | java.lang.String | *No description.* | | usernameInput | java.lang.String | *No description.* | | usernameTemplateInput | java.lang.String | *No description.* | | verifyConnectionInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -19373,8 +19518,12 @@ public void resetVerifyConnection() | name | java.lang.String | *No description.* | | password | java.lang.String | *No description.* | | pluginName | java.lang.String | *No description.* | +| privateKey | java.lang.String | *No description.* | | rootRotationStatements | java.util.List | *No description.* | +| selfManaged | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | serviceAccountJson | java.lang.String | *No description.* | +| tlsCa | java.lang.String | *No description.* | +| tlsCertificate | java.lang.String | *No description.* | | username | java.lang.String | *No description.* | | usernameTemplate | java.lang.String | *No description.* | | verifyConnection | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -19516,6 +19665,16 @@ public java.lang.String getPluginNameInput(); --- +##### `privateKeyInput`Optional + +```java +public java.lang.String getPrivateKeyInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `rootRotationStatementsInput`Optional ```java @@ -19526,6 +19685,16 @@ public java.util.List getRootRotationStatementsInput(); --- +##### `selfManagedInput`Optional + +```java +public java.lang.Object getSelfManagedInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `serviceAccountJsonInput`Optional ```java @@ -19536,6 +19705,26 @@ public java.lang.String getServiceAccountJsonInput(); --- +##### `tlsCaInput`Optional + +```java +public java.lang.String getTlsCaInput(); +``` + +- *Type:* java.lang.String + +--- + +##### `tlsCertificateInput`Optional + +```java +public java.lang.String getTlsCertificateInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `usernameInput`Optional ```java @@ -19676,6 +19865,16 @@ public java.lang.String getPluginName(); --- +##### `privateKey`Required + +```java +public java.lang.String getPrivateKey(); +``` + +- *Type:* java.lang.String + +--- + ##### `rootRotationStatements`Required ```java @@ -19686,6 +19885,16 @@ public java.util.List getRootRotationStatements(); --- +##### `selfManaged`Required + +```java +public java.lang.Object getSelfManaged(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `serviceAccountJson`Required ```java @@ -19696,6 +19905,26 @@ public java.lang.String getServiceAccountJson(); --- +##### `tlsCa`Required + +```java +public java.lang.String getTlsCa(); +``` + +- *Type:* java.lang.String + +--- + +##### `tlsCertificate`Required + +```java +public java.lang.String getTlsCertificate(); +``` + +- *Type:* java.lang.String + +--- + ##### `username`Required ```java diff --git a/docs/databaseSecretsMount.python.md b/docs/databaseSecretsMount.python.md index 745b6c0c..d7ad784b 100644 --- a/docs/databaseSecretsMount.python.md +++ b/docs/databaseSecretsMount.python.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -85,7 +85,7 @@ databaseSecretsMount.DatabaseSecretsMount( | elasticsearch | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]] | elasticsearch block. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | | hana | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]] | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | influxdb | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] | influxdb block. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -178,7 +178,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -379,7 +379,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -389,7 +389,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -399,7 +399,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -409,7 +409,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -419,7 +419,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -429,7 +429,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -439,7 +439,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -449,7 +449,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -459,7 +459,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -469,7 +469,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -479,7 +479,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -489,7 +489,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -499,7 +499,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -509,7 +509,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -519,7 +519,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -529,7 +529,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -539,7 +539,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -1534,7 +1534,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2586,6 +2586,7 @@ databaseSecretsMount.DatabaseSecretsMountCassandra( port: typing.Union[int, float] = None, protocol_version: typing.Union[int, float] = None, root_rotation_statements: typing.List[str] = None, + skip_verification: typing.Union[bool, IResolvable] = None, tls: typing.Union[bool, IResolvable] = None, username: str = None, verify_connection: typing.Union[bool, IResolvable] = None @@ -2609,6 +2610,7 @@ databaseSecretsMount.DatabaseSecretsMountCassandra( | port | typing.Union[int, float] | The transport port to use to connect to Cassandra. | | protocol_version | typing.Union[int, float] | The CQL protocol version to use. | | root_rotation_statements | typing.List[str] | A list of database statements to be executed to rotate the root user's credentials. | +| skip_verification | typing.Union[bool, cdktf.IResolvable] | Skip permissions checks when a connection to Cassandra is first created. | | tls | typing.Union[bool, cdktf.IResolvable] | Whether to use TLS when connecting to Cassandra. | | username | str | The username to use when authenticating with Cassandra. | | verify_connection | typing.Union[bool, cdktf.IResolvable] | Specifies if the connection is verified during initial configuration. | @@ -2625,7 +2627,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2639,7 +2641,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2653,7 +2655,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2667,7 +2669,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2681,7 +2683,7 @@ hosts: typing.List[str] Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2695,7 +2697,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2709,7 +2711,7 @@ password: str The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2725,7 +2727,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2741,7 +2743,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2757,7 +2759,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2771,7 +2773,7 @@ port: typing.Union[int, float] The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2785,7 +2787,7 @@ protocol_version: typing.Union[int, float] The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2799,7 +2801,23 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `skip_verification`Optional + +```python +skip_verification: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification} --- @@ -2813,7 +2831,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2827,7 +2845,7 @@ username: str The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2841,7 +2859,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2924,7 +2942,7 @@ databaseSecretsMount.DatabaseSecretsMountConfig( | elasticsearch | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountElasticsearch]] | elasticsearch block. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | | hana | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountHana]] | hana block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | influxdb | typing.Union[cdktf.IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] | influxdb block. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -3031,7 +3049,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -3045,7 +3063,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -3059,7 +3077,7 @@ allowed_response_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -3073,7 +3091,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -3087,7 +3105,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -3101,7 +3119,7 @@ cassandra: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCassandra]] cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -3115,7 +3133,7 @@ couchbase: typing.Union[IResolvable, typing.List[DatabaseSecretsMountCouchbase]] couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -3129,7 +3147,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -3143,7 +3161,7 @@ delegated_auth_accessors: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -3157,7 +3175,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -3171,7 +3189,7 @@ elasticsearch: typing.Union[IResolvable, typing.List[DatabaseSecretsMountElastic elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -3185,7 +3203,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -3199,7 +3217,7 @@ hana: typing.Union[IResolvable, typing.List[DatabaseSecretsMountHana]] hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -3211,7 +3229,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -3228,7 +3246,7 @@ identity_token_key: str The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -3242,7 +3260,7 @@ influxdb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountInfluxdb]] influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -3256,7 +3274,7 @@ listing_visibility: str Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -3270,7 +3288,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -3284,7 +3302,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -3298,7 +3316,7 @@ mongodb: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodb]] mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -3312,7 +3330,7 @@ mongodbatlas: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMongodba mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -3326,7 +3344,7 @@ mssql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMssql]] mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -3340,7 +3358,7 @@ mysql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysql]] mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -3354,7 +3372,7 @@ mysql_aurora: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlAur mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -3368,7 +3386,7 @@ mysql_legacy: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlLeg mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -3382,7 +3400,7 @@ mysql_rds: typing.Union[IResolvable, typing.List[DatabaseSecretsMountMysqlRds]] mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -3396,7 +3414,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -3410,7 +3428,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -3424,7 +3442,7 @@ oracle: typing.Union[IResolvable, typing.List[DatabaseSecretsMountOracle]] oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -3438,7 +3456,7 @@ passthrough_request_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -3452,7 +3470,7 @@ plugin_version: str Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -3466,7 +3484,7 @@ postgresql: typing.Union[IResolvable, typing.List[DatabaseSecretsMountPostgresql postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -3480,7 +3498,7 @@ redis: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedis]] redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -3494,7 +3512,7 @@ redis_elasticache: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRed redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -3508,7 +3526,7 @@ redshift: typing.Union[IResolvable, typing.List[DatabaseSecretsMountRedshift]] redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -3522,7 +3540,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -3536,7 +3554,7 @@ snowflake: typing.Union[IResolvable, typing.List[DatabaseSecretsMountSnowflake]] snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -3596,7 +3614,7 @@ hosts: typing.List[str] A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -3610,7 +3628,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3624,7 +3642,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3638,7 +3656,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3652,7 +3670,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3668,7 +3686,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3682,7 +3700,7 @@ bucket_name: str Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3696,7 +3714,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3710,7 +3728,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3726,7 +3744,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3740,7 +3758,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3754,7 +3772,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3768,7 +3786,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3782,7 +3800,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3846,7 +3864,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3860,7 +3878,7 @@ password: str The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3874,7 +3892,7 @@ url: str The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3888,7 +3906,7 @@ username: str The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3902,7 +3920,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3916,7 +3934,7 @@ ca_cert: str The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3930,7 +3948,7 @@ ca_path: str The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3944,7 +3962,7 @@ client_cert: str The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3958,7 +3976,7 @@ client_key: str The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3972,7 +3990,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3986,7 +4004,7 @@ insecure: typing.Union[bool, IResolvable] Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -4002,7 +4020,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4016,7 +4034,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4030,7 +4048,7 @@ tls_server_name: str This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -4044,7 +4062,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4058,7 +4076,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4116,7 +4134,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4130,7 +4148,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4144,7 +4162,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4158,7 +4176,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4172,7 +4190,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4186,7 +4204,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4200,7 +4218,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4214,7 +4232,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4228,7 +4246,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4244,7 +4262,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4258,7 +4276,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4272,7 +4290,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4286,7 +4304,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4350,7 +4368,7 @@ host: str Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -4364,7 +4382,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4378,7 +4396,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4392,7 +4410,7 @@ username: str Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4406,7 +4424,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4420,7 +4438,7 @@ connect_timeout: typing.Union[int, float] The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -4434,7 +4452,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4448,7 +4466,7 @@ insecure_tls: typing.Union[bool, IResolvable] Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -4464,7 +4482,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -4480,7 +4498,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -4496,7 +4514,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4510,7 +4528,7 @@ port: typing.Union[int, float] The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -4524,7 +4542,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4538,7 +4556,7 @@ tls: typing.Union[bool, IResolvable] Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -4552,7 +4570,7 @@ username_template: str Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4566,7 +4584,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4624,7 +4642,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4638,7 +4656,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4652,7 +4670,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4666,7 +4684,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4680,7 +4698,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4694,7 +4712,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4708,7 +4726,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4722,7 +4740,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4738,7 +4756,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4752,7 +4770,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4766,7 +4784,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4780,7 +4798,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4794,7 +4812,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4844,7 +4862,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4858,7 +4876,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4872,7 +4890,7 @@ project_id: str The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4886,7 +4904,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4900,7 +4918,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4914,7 +4932,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4930,7 +4948,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4944,7 +4962,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4958,7 +4976,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5020,7 +5038,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5034,7 +5052,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5048,7 +5066,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5062,7 +5080,7 @@ contained_db: typing.Union[bool, IResolvable] Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -5076,7 +5094,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5090,7 +5108,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5104,7 +5122,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5118,7 +5136,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5132,7 +5150,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5146,7 +5164,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5162,7 +5180,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5176,7 +5194,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5190,7 +5208,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5204,7 +5222,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5218,7 +5236,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5284,7 +5302,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5298,7 +5316,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5312,7 +5330,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5326,7 +5344,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5340,7 +5358,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5354,7 +5372,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5368,7 +5386,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5382,7 +5400,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5396,7 +5414,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5412,7 +5430,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5426,7 +5444,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5440,7 +5458,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5454,7 +5472,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5470,7 +5488,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5484,7 +5502,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5498,7 +5516,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5512,7 +5530,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5578,7 +5596,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5592,7 +5610,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5606,7 +5624,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5620,7 +5638,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5634,7 +5652,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5648,7 +5666,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5662,7 +5680,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5676,7 +5694,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5690,7 +5708,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5706,7 +5724,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5720,7 +5738,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5734,7 +5752,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5748,7 +5766,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5764,7 +5782,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5778,7 +5796,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5792,7 +5810,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5806,7 +5824,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5872,7 +5890,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5886,7 +5904,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5900,7 +5918,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5914,7 +5932,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5928,7 +5946,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5942,7 +5960,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5956,7 +5974,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5970,7 +5988,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5984,7 +6002,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6000,7 +6018,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6014,7 +6032,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6028,7 +6046,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6042,7 +6060,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -6058,7 +6076,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6072,7 +6090,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6086,7 +6104,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6100,7 +6118,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6166,7 +6184,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6180,7 +6198,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6194,7 +6212,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6208,7 +6226,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6222,7 +6240,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6236,7 +6254,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6250,7 +6268,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6264,7 +6282,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6278,7 +6296,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6294,7 +6312,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6308,7 +6326,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6322,7 +6340,7 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -6336,7 +6354,7 @@ tls_ca: str x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -6352,7 +6370,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -6366,7 +6384,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6380,7 +6398,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6394,7 +6412,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6456,7 +6474,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6470,7 +6488,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6484,7 +6502,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6498,7 +6516,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6512,7 +6530,7 @@ disconnect_sessions: typing.Union[bool, IResolvable] Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -6526,7 +6544,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6540,7 +6558,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6554,7 +6572,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6568,7 +6586,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6584,7 +6602,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6598,7 +6616,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6612,7 +6630,7 @@ split_statements: typing.Union[bool, IResolvable] Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -6626,7 +6644,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6640,7 +6658,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6654,7 +6672,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6677,8 +6695,12 @@ databaseSecretsMount.DatabaseSecretsMountPostgresql( max_open_connections: typing.Union[int, float] = None, password: str = None, plugin_name: str = None, + private_key: str = None, root_rotation_statements: typing.List[str] = None, + self_managed: typing.Union[bool, IResolvable] = None, service_account_json: str = None, + tls_ca: str = None, + tls_certificate: str = None, username: str = None, username_template: str = None, verify_connection: typing.Union[bool, IResolvable] = None @@ -6700,8 +6722,12 @@ databaseSecretsMount.DatabaseSecretsMountPostgresql( | max_open_connections | typing.Union[int, float] | Maximum number of open connections to the database. | | password | str | The root credential password used in the connection URL. | | plugin_name | str | Specifies the name of the plugin to use for this connection. | +| private_key | str | The secret key used for the x509 client certificate. Must be PEM encoded. | | root_rotation_statements | typing.List[str] | A list of database statements to be executed to rotate the root user's credentials. | +| self_managed | typing.Union[bool, cdktf.IResolvable] | If set, allows onboarding static roles with a rootless connection configuration. | | service_account_json | str | A JSON encoded credential for use with IAM authorization. | +| tls_ca | str | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tls_certificate | str | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | str | The root credential username used in the connection URL. | | username_template | str | Username generation template. | | verify_connection | typing.Union[bool, cdktf.IResolvable] | Specifies if the connection is verified during initial configuration. | @@ -6718,7 +6744,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6732,7 +6758,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6746,7 +6772,7 @@ auth_type: str Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -6760,7 +6786,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6774,7 +6800,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6788,7 +6814,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6802,7 +6828,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6816,7 +6842,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6830,7 +6856,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6844,7 +6870,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6860,7 +6886,21 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + +--- + +##### `private_key`Optional + +```python +private_key: str +``` + +- *Type:* str + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -6874,7 +6914,21 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `self_managed`Optional + +```python +self_managed: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed} --- @@ -6888,7 +6942,35 @@ service_account_json: str A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + +--- + +##### `tls_ca`Optional + +```python +tls_ca: str +``` + +- *Type:* str + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + +--- + +##### `tls_certificate`Optional + +```python +tls_certificate: str +``` + +- *Type:* str + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate} --- @@ -6902,7 +6984,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6916,7 +6998,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6930,7 +7012,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6988,7 +7070,7 @@ host: str Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -7002,7 +7084,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7016,7 +7098,7 @@ password: str Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7030,7 +7112,7 @@ username: str Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7044,7 +7126,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7058,7 +7140,7 @@ ca_cert: str The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -7072,7 +7154,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7086,7 +7168,7 @@ insecure_tls: typing.Union[bool, IResolvable] Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -7102,7 +7184,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7116,7 +7198,7 @@ port: typing.Union[int, float] The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -7130,7 +7212,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7144,7 +7226,7 @@ tls: typing.Union[bool, IResolvable] Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -7158,7 +7240,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7210,7 +7292,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7224,7 +7306,7 @@ url: str The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -7238,7 +7320,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7252,7 +7334,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7268,7 +7350,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7284,7 +7366,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7300,7 +7382,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -7314,7 +7396,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7330,7 +7412,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7344,7 +7426,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7404,7 +7486,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7418,7 +7500,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7432,7 +7514,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7446,7 +7528,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7460,7 +7542,7 @@ disable_escaping: typing.Union[bool, IResolvable] Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -7474,7 +7556,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7488,7 +7570,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7502,7 +7584,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7516,7 +7598,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7532,7 +7614,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7546,7 +7628,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7560,7 +7642,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7574,7 +7656,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7588,7 +7670,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7646,7 +7728,7 @@ name: str Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -7660,7 +7742,7 @@ allowed_roles: typing.List[str] A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -7674,7 +7756,7 @@ connection_url: str Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -7688,7 +7770,7 @@ data: typing.Mapping[str] A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -7702,7 +7784,7 @@ max_connection_lifetime: typing.Union[int, float] Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -7716,7 +7798,7 @@ max_idle_connections: typing.Union[int, float] Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -7730,7 +7812,7 @@ max_open_connections: typing.Union[int, float] Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -7744,7 +7826,7 @@ password: str The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -7760,7 +7842,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -7774,7 +7856,7 @@ root_rotation_statements: typing.List[str] A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -7788,7 +7870,7 @@ username: str The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -7802,7 +7884,7 @@ username_template: str Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -7816,7 +7898,7 @@ verify_connection: typing.Union[bool, IResolvable] Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -8077,6 +8159,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | reset_port | *No description.* | | reset_protocol_version | *No description.* | | reset_root_rotation_statements | *No description.* | +| reset_skip_verification | *No description.* | | reset_tls | *No description.* | | reset_username | *No description.* | | reset_verify_connection | *No description.* | @@ -8327,6 +8410,12 @@ def reset_protocol_version() -> None def reset_root_rotation_statements() -> None ``` +##### `reset_skip_verification` + +```python +def reset_skip_verification() -> None +``` + ##### `reset_tls` ```python @@ -8365,6 +8454,7 @@ def reset_verify_connection() -> None | port_input | typing.Union[int, float] | *No description.* | | protocol_version_input | typing.Union[int, float] | *No description.* | | root_rotation_statements_input | typing.List[str] | *No description.* | +| skip_verification_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | tls_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username_input | str | *No description.* | | verify_connection_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -8381,6 +8471,7 @@ def reset_verify_connection() -> None | port | typing.Union[int, float] | *No description.* | | protocol_version | typing.Union[int, float] | *No description.* | | root_rotation_statements | typing.List[str] | *No description.* | +| skip_verification | typing.Union[bool, cdktf.IResolvable] | *No description.* | | tls | typing.Union[bool, cdktf.IResolvable] | *No description.* | | username | str | *No description.* | | verify_connection | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -8542,6 +8633,16 @@ root_rotation_statements_input: typing.List[str] --- +##### `skip_verification_input`Optional + +```python +skip_verification_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `tls_input`Optional ```python @@ -8702,6 +8803,16 @@ root_rotation_statements: typing.List[str] --- +##### `skip_verification`Required + +```python +skip_verification: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `tls`Required ```python @@ -19587,8 +19698,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | reset_max_open_connections | *No description.* | | reset_password | *No description.* | | reset_plugin_name | *No description.* | +| reset_private_key | *No description.* | | reset_root_rotation_statements | *No description.* | +| reset_self_managed | *No description.* | | reset_service_account_json | *No description.* | +| reset_tls_ca | *No description.* | +| reset_tls_certificate | *No description.* | | reset_username | *No description.* | | reset_username_template | *No description.* | | reset_verify_connection | *No description.* | @@ -19827,18 +19942,42 @@ def reset_password() -> None def reset_plugin_name() -> None ``` +##### `reset_private_key` + +```python +def reset_private_key() -> None +``` + ##### `reset_root_rotation_statements` ```python def reset_root_rotation_statements() -> None ``` +##### `reset_self_managed` + +```python +def reset_self_managed() -> None +``` + ##### `reset_service_account_json` ```python def reset_service_account_json() -> None ``` +##### `reset_tls_ca` + +```python +def reset_tls_ca() -> None +``` + +##### `reset_tls_certificate` + +```python +def reset_tls_certificate() -> None +``` + ##### `reset_username` ```python @@ -19875,8 +20014,12 @@ def reset_verify_connection() -> None | name_input | str | *No description.* | | password_input | str | *No description.* | | plugin_name_input | str | *No description.* | +| private_key_input | str | *No description.* | | root_rotation_statements_input | typing.List[str] | *No description.* | +| self_managed_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | service_account_json_input | str | *No description.* | +| tls_ca_input | str | *No description.* | +| tls_certificate_input | str | *No description.* | | username_input | str | *No description.* | | username_template_input | str | *No description.* | | verify_connection_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -19891,8 +20034,12 @@ def reset_verify_connection() -> None | name | str | *No description.* | | password | str | *No description.* | | plugin_name | str | *No description.* | +| private_key | str | *No description.* | | root_rotation_statements | typing.List[str] | *No description.* | +| self_managed | typing.Union[bool, cdktf.IResolvable] | *No description.* | | service_account_json | str | *No description.* | +| tls_ca | str | *No description.* | +| tls_certificate | str | *No description.* | | username | str | *No description.* | | username_template | str | *No description.* | | verify_connection | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -20034,6 +20181,16 @@ plugin_name_input: str --- +##### `private_key_input`Optional + +```python +private_key_input: str +``` + +- *Type:* str + +--- + ##### `root_rotation_statements_input`Optional ```python @@ -20044,6 +20201,16 @@ root_rotation_statements_input: typing.List[str] --- +##### `self_managed_input`Optional + +```python +self_managed_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `service_account_json_input`Optional ```python @@ -20054,6 +20221,26 @@ service_account_json_input: str --- +##### `tls_ca_input`Optional + +```python +tls_ca_input: str +``` + +- *Type:* str + +--- + +##### `tls_certificate_input`Optional + +```python +tls_certificate_input: str +``` + +- *Type:* str + +--- + ##### `username_input`Optional ```python @@ -20194,6 +20381,16 @@ plugin_name: str --- +##### `private_key`Required + +```python +private_key: str +``` + +- *Type:* str + +--- + ##### `root_rotation_statements`Required ```python @@ -20204,6 +20401,16 @@ root_rotation_statements: typing.List[str] --- +##### `self_managed`Required + +```python +self_managed: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `service_account_json`Required ```python @@ -20214,6 +20421,26 @@ service_account_json: str --- +##### `tls_ca`Required + +```python +tls_ca: str +``` + +- *Type:* str + +--- + +##### `tls_certificate`Required + +```python +tls_certificate: str +``` + +- *Type:* str + +--- + ##### `username`Required ```python diff --git a/docs/databaseSecretsMount.typescript.md b/docs/databaseSecretsMount.typescript.md index de203340..d1b725f2 100644 --- a/docs/databaseSecretsMount.typescript.md +++ b/docs/databaseSecretsMount.typescript.md @@ -4,7 +4,7 @@ ### DatabaseSecretsMount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount vault_database_secrets_mount}. #### Initializers @@ -953,7 +953,7 @@ The construct id used in the generated config for the DatabaseSecretsMount to im The id of the existing DatabaseSecretsMount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#import import section} in the documentation of this resource for the id to use --- @@ -2011,6 +2011,7 @@ const databaseSecretsMountCassandra: databaseSecretsMount.DatabaseSecretsMountCa | port | number | The transport port to use to connect to Cassandra. | | protocolVersion | number | The CQL protocol version to use. | | rootRotationStatements | string[] | A list of database statements to be executed to rotate the root user's credentials. | +| skipVerification | boolean \| cdktf.IResolvable | Skip permissions checks when a connection to Cassandra is first created. | | tls | boolean \| cdktf.IResolvable | Whether to use TLS when connecting to Cassandra. | | username | string | The username to use when authenticating with Cassandra. | | verifyConnection | boolean \| cdktf.IResolvable | Specifies if the connection is verified during initial configuration. | @@ -2027,7 +2028,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2041,7 +2042,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -2055,7 +2056,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -2069,7 +2070,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -2083,7 +2084,7 @@ public readonly hosts: string[]; Cassandra hosts to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2097,7 +2098,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -2111,7 +2112,7 @@ public readonly password: string; The password to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2127,7 +2128,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -2143,7 +2144,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -2159,7 +2160,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -2173,7 +2174,7 @@ public readonly port: number; The transport port to use to connect to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -2187,7 +2188,7 @@ public readonly protocolVersion: number; The CQL protocol version to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#protocol_version DatabaseSecretsMount#protocol_version} --- @@ -2201,7 +2202,23 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `skipVerification`Optional + +```typescript +public readonly skipVerification: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Skip permissions checks when a connection to Cassandra is first created. + +These checks ensure that Vault is able to create roles, but can be resource intensive in clusters with many roles. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#skip_verification DatabaseSecretsMount#skip_verification} --- @@ -2215,7 +2232,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -2229,7 +2246,7 @@ public readonly username: string; The username to use when authenticating with Cassandra. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2243,7 +2260,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -2281,7 +2298,7 @@ const databaseSecretsMountConfig: databaseSecretsMount.DatabaseSecretsMountConfi | elasticsearch | cdktf.IResolvable \| DatabaseSecretsMountElasticsearch[] | elasticsearch block. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | | hana | cdktf.IResolvable \| DatabaseSecretsMountHana[] | hana block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. | | identityTokenKey | string | The key to use for signing plugin workload identity tokens. | | influxdb | cdktf.IResolvable \| DatabaseSecretsMountInfluxdb[] | influxdb block. | | listingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -2388,7 +2405,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#path DatabaseSecretsMount#path} --- @@ -2402,7 +2419,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_managed_keys DatabaseSecretsMount#allowed_managed_keys} --- @@ -2416,7 +2433,7 @@ public readonly allowedResponseHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_response_headers DatabaseSecretsMount#allowed_response_headers} --- @@ -2430,7 +2447,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_request_keys DatabaseSecretsMount#audit_non_hmac_request_keys} --- @@ -2444,7 +2461,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#audit_non_hmac_response_keys DatabaseSecretsMount#audit_non_hmac_response_keys} --- @@ -2458,7 +2475,7 @@ public readonly cassandra: IResolvable | DatabaseSecretsMountCassandra[]; cassandra block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#cassandra DatabaseSecretsMount#cassandra} --- @@ -2472,7 +2489,7 @@ public readonly couchbase: IResolvable | DatabaseSecretsMountCouchbase[]; couchbase block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#couchbase DatabaseSecretsMount#couchbase} --- @@ -2486,7 +2503,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#default_lease_ttl_seconds DatabaseSecretsMount#default_lease_ttl_seconds} --- @@ -2500,7 +2517,7 @@ public readonly delegatedAuthAccessors: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#delegated_auth_accessors DatabaseSecretsMount#delegated_auth_accessors} --- @@ -2514,7 +2531,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#description DatabaseSecretsMount#description} --- @@ -2528,7 +2545,7 @@ public readonly elasticsearch: IResolvable | DatabaseSecretsMountElasticsearch[] elasticsearch block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#elasticsearch DatabaseSecretsMount#elasticsearch} --- @@ -2542,7 +2559,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#external_entropy_access DatabaseSecretsMount#external_entropy_access} --- @@ -2556,7 +2573,7 @@ public readonly hana: IResolvable | DatabaseSecretsMountHana[]; hana block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hana DatabaseSecretsMount#hana} --- @@ -2568,7 +2585,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#id DatabaseSecretsMount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2585,7 +2602,7 @@ public readonly identityTokenKey: string; The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#identity_token_key DatabaseSecretsMount#identity_token_key} --- @@ -2599,7 +2616,7 @@ public readonly influxdb: IResolvable | DatabaseSecretsMountInfluxdb[]; influxdb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#influxdb DatabaseSecretsMount#influxdb} --- @@ -2613,7 +2630,7 @@ public readonly listingVisibility: string; Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#listing_visibility DatabaseSecretsMount#listing_visibility} --- @@ -2627,7 +2644,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#local DatabaseSecretsMount#local} --- @@ -2641,7 +2658,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_lease_ttl_seconds DatabaseSecretsMount#max_lease_ttl_seconds} --- @@ -2655,7 +2672,7 @@ public readonly mongodb: IResolvable | DatabaseSecretsMountMongodb[]; mongodb block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodb DatabaseSecretsMount#mongodb} --- @@ -2669,7 +2686,7 @@ public readonly mongodbatlas: IResolvable | DatabaseSecretsMountMongodbatlas[]; mongodbatlas block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mongodbatlas DatabaseSecretsMount#mongodbatlas} --- @@ -2683,7 +2700,7 @@ public readonly mssql: IResolvable | DatabaseSecretsMountMssql[]; mssql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mssql DatabaseSecretsMount#mssql} --- @@ -2697,7 +2714,7 @@ public readonly mysql: IResolvable | DatabaseSecretsMountMysql[]; mysql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql DatabaseSecretsMount#mysql} --- @@ -2711,7 +2728,7 @@ public readonly mysqlAurora: IResolvable | DatabaseSecretsMountMysqlAurora[]; mysql_aurora block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_aurora DatabaseSecretsMount#mysql_aurora} --- @@ -2725,7 +2742,7 @@ public readonly mysqlLegacy: IResolvable | DatabaseSecretsMountMysqlLegacy[]; mysql_legacy block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_legacy DatabaseSecretsMount#mysql_legacy} --- @@ -2739,7 +2756,7 @@ public readonly mysqlRds: IResolvable | DatabaseSecretsMountMysqlRds[]; mysql_rds block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#mysql_rds DatabaseSecretsMount#mysql_rds} --- @@ -2753,7 +2770,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#namespace DatabaseSecretsMount#namespace} --- @@ -2767,7 +2784,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#options DatabaseSecretsMount#options} --- @@ -2781,7 +2798,7 @@ public readonly oracle: IResolvable | DatabaseSecretsMountOracle[]; oracle block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#oracle DatabaseSecretsMount#oracle} --- @@ -2795,7 +2812,7 @@ public readonly passthroughRequestHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#passthrough_request_headers DatabaseSecretsMount#passthrough_request_headers} --- @@ -2809,7 +2826,7 @@ public readonly pluginVersion: string; Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_version DatabaseSecretsMount#plugin_version} --- @@ -2823,7 +2840,7 @@ public readonly postgresql: IResolvable | DatabaseSecretsMountPostgresql[]; postgresql block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#postgresql DatabaseSecretsMount#postgresql} --- @@ -2837,7 +2854,7 @@ public readonly redis: IResolvable | DatabaseSecretsMountRedis[]; redis block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis DatabaseSecretsMount#redis} --- @@ -2851,7 +2868,7 @@ public readonly redisElasticache: IResolvable | DatabaseSecretsMountRedisElastic redis_elasticache block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redis_elasticache DatabaseSecretsMount#redis_elasticache} --- @@ -2865,7 +2882,7 @@ public readonly redshift: IResolvable | DatabaseSecretsMountRedshift[]; redshift block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#redshift DatabaseSecretsMount#redshift} --- @@ -2879,7 +2896,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#seal_wrap DatabaseSecretsMount#seal_wrap} --- @@ -2893,7 +2910,7 @@ public readonly snowflake: IResolvable | DatabaseSecretsMountSnowflake[]; snowflake block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#snowflake DatabaseSecretsMount#snowflake} --- @@ -2938,7 +2955,7 @@ public readonly hosts: string[]; A set of Couchbase URIs to connect to. Must use `couchbases://` scheme if `tls` is `true`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#hosts DatabaseSecretsMount#hosts} --- @@ -2952,7 +2969,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -2966,7 +2983,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -2980,7 +2997,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -2994,7 +3011,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3010,7 +3027,7 @@ Required if `tls` is `true`. Specifies the certificate authority of the Couchbase server, as a PEM certificate that has been base64 encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#base64_pem DatabaseSecretsMount#base64_pem} --- @@ -3024,7 +3041,7 @@ public readonly bucketName: string; Required for Couchbase versions prior to 6.5.0. This is only used to verify vault's connection to the server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#bucket_name DatabaseSecretsMount#bucket_name} --- @@ -3038,7 +3055,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3052,7 +3069,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3068,7 +3085,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3082,7 +3099,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3096,7 +3113,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Couchbase. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3110,7 +3127,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3124,7 +3141,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3171,7 +3188,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3185,7 +3202,7 @@ public readonly password: string; The password to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3199,7 +3216,7 @@ public readonly url: string; The URL for Elasticsearch's API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -3213,7 +3230,7 @@ public readonly username: string; The username to be used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3227,7 +3244,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3241,7 +3258,7 @@ public readonly caCert: string; The path to a PEM-encoded CA cert file to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -3255,7 +3272,7 @@ public readonly caPath: string; The path to a directory of PEM-encoded CA cert files to use to verify the Elasticsearch server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_path DatabaseSecretsMount#ca_path} --- @@ -3269,7 +3286,7 @@ public readonly clientCert: string; The path to the certificate for the Elasticsearch client to present for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_cert DatabaseSecretsMount#client_cert} --- @@ -3283,7 +3300,7 @@ public readonly clientKey: string; The path to the key for the Elasticsearch client to use for communication. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#client_key DatabaseSecretsMount#client_key} --- @@ -3297,7 +3314,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3311,7 +3328,7 @@ public readonly insecure: boolean | IResolvable; Whether to disable certificate verification. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure DatabaseSecretsMount#insecure} --- @@ -3327,7 +3344,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3341,7 +3358,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3355,7 +3372,7 @@ public readonly tlsServerName: string; This, if set, is used to set the SNI host when connecting via TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_server_name DatabaseSecretsMount#tls_server_name} --- @@ -3369,7 +3386,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3383,7 +3400,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3427,7 +3444,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3441,7 +3458,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3455,7 +3472,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3469,7 +3486,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3483,7 +3500,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -3497,7 +3514,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3511,7 +3528,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3525,7 +3542,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -3539,7 +3556,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3555,7 +3572,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3569,7 +3586,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3583,7 +3600,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3597,7 +3614,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3644,7 +3661,7 @@ public readonly host: string; Influxdb host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -3658,7 +3675,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3672,7 +3689,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -3686,7 +3703,7 @@ public readonly username: string; Specifies the username to use for superuser access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -3700,7 +3717,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3714,7 +3731,7 @@ public readonly connectTimeout: number; The number of seconds to use as a connection timeout. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connect_timeout DatabaseSecretsMount#connect_timeout} --- @@ -3728,7 +3745,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3742,7 +3759,7 @@ public readonly insecureTls: boolean | IResolvable; Whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -3758,7 +3775,7 @@ Concatenated PEM blocks containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_bundle DatabaseSecretsMount#pem_bundle} --- @@ -3774,7 +3791,7 @@ Specifies JSON containing a certificate and private key; a certificate, private key, and issuing CA certificate; or just a CA certificate. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#pem_json DatabaseSecretsMount#pem_json} --- @@ -3790,7 +3807,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -3804,7 +3821,7 @@ public readonly port: number; The transport port to use to connect to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -3818,7 +3835,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -3832,7 +3849,7 @@ public readonly tls: boolean | IResolvable; Whether to use TLS when connecting to Influxdb. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -3846,7 +3863,7 @@ public readonly usernameTemplate: string; Template describing how dynamic usernames are generated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -3860,7 +3877,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -3904,7 +3921,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -3918,7 +3935,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -3932,7 +3949,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -3946,7 +3963,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -3960,7 +3977,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -3974,7 +3991,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -3988,7 +4005,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4002,7 +4019,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4018,7 +4035,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4032,7 +4049,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4046,7 +4063,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4060,7 +4077,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4074,7 +4091,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4114,7 +4131,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4128,7 +4145,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -4142,7 +4159,7 @@ public readonly projectId: string; The Project ID the Database User should be created within. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#project_id DatabaseSecretsMount#project_id} --- @@ -4156,7 +4173,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#public_key DatabaseSecretsMount#public_key} --- @@ -4170,7 +4187,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4184,7 +4201,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4200,7 +4217,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4214,7 +4231,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4228,7 +4245,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4274,7 +4291,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4288,7 +4305,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4302,7 +4319,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4316,7 +4333,7 @@ public readonly containedDb: boolean | IResolvable; Set to true when the target is a Contained Database, e.g. AzureSQL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#contained_db DatabaseSecretsMount#contained_db} --- @@ -4330,7 +4347,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4344,7 +4361,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -4358,7 +4375,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4372,7 +4389,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4386,7 +4403,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4400,7 +4417,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4416,7 +4433,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4430,7 +4447,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4444,7 +4461,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4458,7 +4475,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4472,7 +4489,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4520,7 +4537,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4534,7 +4551,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4548,7 +4565,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4562,7 +4579,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4576,7 +4593,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4590,7 +4607,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4604,7 +4621,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4618,7 +4635,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4632,7 +4649,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4648,7 +4665,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4662,7 +4679,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4676,7 +4693,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4690,7 +4707,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4706,7 +4723,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4720,7 +4737,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -4734,7 +4751,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -4748,7 +4765,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -4796,7 +4813,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -4810,7 +4827,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -4824,7 +4841,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -4838,7 +4855,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -4852,7 +4869,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -4866,7 +4883,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -4880,7 +4897,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -4894,7 +4911,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -4908,7 +4925,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -4924,7 +4941,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -4938,7 +4955,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -4952,7 +4969,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -4966,7 +4983,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -4982,7 +4999,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -4996,7 +5013,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5010,7 +5027,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5024,7 +5041,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5072,7 +5089,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5086,7 +5103,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5100,7 +5117,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5114,7 +5131,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5128,7 +5145,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5142,7 +5159,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5156,7 +5173,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5170,7 +5187,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5184,7 +5201,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5200,7 +5217,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5214,7 +5231,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5228,7 +5245,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5242,7 +5259,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5258,7 +5275,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5272,7 +5289,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5286,7 +5303,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5300,7 +5317,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5348,7 +5365,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5362,7 +5379,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5376,7 +5393,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5390,7 +5407,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5404,7 +5421,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5418,7 +5435,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5432,7 +5449,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5446,7 +5463,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5460,7 +5477,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5476,7 +5493,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5490,7 +5507,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5504,7 +5521,7 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} --- @@ -5518,7 +5535,7 @@ public readonly tlsCa: string; x509 CA file for validating the certificate presented by the MySQL server. Must be PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} --- @@ -5534,7 +5551,7 @@ x509 certificate for connecting to the database. This must be a PEM encoded version of the private key and the certificate combined. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate_key DatabaseSecretsMount#tls_certificate_key} --- @@ -5548,7 +5565,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5562,7 +5579,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5576,7 +5593,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5622,7 +5639,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5636,7 +5653,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5650,7 +5667,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5664,7 +5681,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5678,7 +5695,7 @@ public readonly disconnectSessions: boolean | IResolvable; Set to true to disconnect any open sessions prior to running the revocation statements. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disconnect_sessions DatabaseSecretsMount#disconnect_sessions} --- @@ -5692,7 +5709,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5706,7 +5723,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5720,7 +5737,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5734,7 +5751,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -5750,7 +5767,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -5764,7 +5781,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -5778,7 +5795,7 @@ public readonly splitStatements: boolean | IResolvable; Set to true in order to split statements after semi-colons. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#split_statements DatabaseSecretsMount#split_statements} --- @@ -5792,7 +5809,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -5806,7 +5823,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -5820,7 +5837,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -5849,8 +5866,12 @@ const databaseSecretsMountPostgresql: databaseSecretsMount.DatabaseSecretsMountP | maxOpenConnections | number | Maximum number of open connections to the database. | | password | string | The root credential password used in the connection URL. | | pluginName | string | Specifies the name of the plugin to use for this connection. | +| privateKey | string | The secret key used for the x509 client certificate. Must be PEM encoded. | | rootRotationStatements | string[] | A list of database statements to be executed to rotate the root user's credentials. | +| selfManaged | boolean \| cdktf.IResolvable | If set, allows onboarding static roles with a rootless connection configuration. | | serviceAccountJson | string | A JSON encoded credential for use with IAM authorization. | +| tlsCa | string | The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. | +| tlsCertificate | string | The x509 client certificate for connecting to the database. Must be PEM encoded. | | username | string | The root credential username used in the connection URL. | | usernameTemplate | string | Username generation template. | | verifyConnection | boolean \| cdktf.IResolvable | Specifies if the connection is verified during initial configuration. | @@ -5867,7 +5888,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -5881,7 +5902,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -5895,7 +5916,7 @@ public readonly authType: string; Specify alternative authorization type. (Only 'gcp_iam' is valid currently). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#auth_type DatabaseSecretsMount#auth_type} --- @@ -5909,7 +5930,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -5923,7 +5944,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -5937,7 +5958,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -5951,7 +5972,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -5965,7 +5986,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -5979,7 +6000,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -5993,7 +6014,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6009,7 +6030,21 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} + +--- + +##### `privateKey`Optional + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +The secret key used for the x509 client certificate. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#private_key DatabaseSecretsMount#private_key} --- @@ -6023,7 +6058,21 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} + +--- + +##### `selfManaged`Optional + +```typescript +public readonly selfManaged: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +If set, allows onboarding static roles with a rootless connection configuration. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#self_managed DatabaseSecretsMount#self_managed} --- @@ -6037,7 +6086,35 @@ public readonly serviceAccountJson: string; A JSON encoded credential for use with IAM authorization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#service_account_json DatabaseSecretsMount#service_account_json} + +--- + +##### `tlsCa`Optional + +```typescript +public readonly tlsCa: string; +``` + +- *Type:* string + +The x509 CA file for validating the certificate presented by the PostgreSQL server. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_ca DatabaseSecretsMount#tls_ca} + +--- + +##### `tlsCertificate`Optional + +```typescript +public readonly tlsCertificate: string; +``` + +- *Type:* string + +The x509 client certificate for connecting to the database. Must be PEM encoded. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls_certificate DatabaseSecretsMount#tls_certificate} --- @@ -6051,7 +6128,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6065,7 +6142,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6079,7 +6156,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6123,7 +6200,7 @@ public readonly host: string; Specifies the host to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#host DatabaseSecretsMount#host} --- @@ -6137,7 +6214,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6151,7 +6228,7 @@ public readonly password: string; Specifies the password corresponding to the given username. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6165,7 +6242,7 @@ public readonly username: string; Specifies the username for Vault to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6179,7 +6256,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6193,7 +6270,7 @@ public readonly caCert: string; The contents of a PEM-encoded CA cert file to use to verify the Redis server's identity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#ca_cert DatabaseSecretsMount#ca_cert} --- @@ -6207,7 +6284,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6221,7 +6298,7 @@ public readonly insecureTls: boolean | IResolvable; Specifies whether to skip verification of the server certificate when using TLS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#insecure_tls DatabaseSecretsMount#insecure_tls} --- @@ -6237,7 +6314,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6251,7 +6328,7 @@ public readonly port: number; The transport port to use to connect to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#port DatabaseSecretsMount#port} --- @@ -6265,7 +6342,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6279,7 +6356,7 @@ public readonly tls: boolean | IResolvable; Specifies whether to use TLS when connecting to Redis. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#tls DatabaseSecretsMount#tls} --- @@ -6293,7 +6370,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6334,7 +6411,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6348,7 +6425,7 @@ public readonly url: string; The configuration endpoint for the ElastiCache cluster to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#url DatabaseSecretsMount#url} --- @@ -6362,7 +6439,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6376,7 +6453,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6392,7 +6469,7 @@ The AWS secret key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6408,7 +6485,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6424,7 +6501,7 @@ The AWS region where the ElastiCache cluster is hosted. If omitted the plugin tries to infer the region from the environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#region DatabaseSecretsMount#region} --- @@ -6438,7 +6515,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6454,7 +6531,7 @@ The AWS access key id to use to talk to ElastiCache. If omitted the credentials chain provider is used instead. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6468,7 +6545,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6513,7 +6590,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6527,7 +6604,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6541,7 +6618,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6555,7 +6632,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6569,7 +6646,7 @@ public readonly disableEscaping: boolean | IResolvable; Disable special character escaping in username and password. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#disable_escaping DatabaseSecretsMount#disable_escaping} --- @@ -6583,7 +6660,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6597,7 +6674,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6611,7 +6688,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6625,7 +6702,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6641,7 +6718,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6655,7 +6732,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6669,7 +6746,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6683,7 +6760,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6697,7 +6774,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -6741,7 +6818,7 @@ public readonly name: string; Name of the database connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#name DatabaseSecretsMount#name} --- @@ -6755,7 +6832,7 @@ public readonly allowedRoles: string[]; A list of roles that are allowed to use this connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#allowed_roles DatabaseSecretsMount#allowed_roles} --- @@ -6769,7 +6846,7 @@ public readonly connectionUrl: string; Connection string to use to connect to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#connection_url DatabaseSecretsMount#connection_url} --- @@ -6783,7 +6860,7 @@ public readonly data: {[ key: string ]: string}; A map of sensitive data to pass to the endpoint. Useful for templated connection strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#data DatabaseSecretsMount#data} --- @@ -6797,7 +6874,7 @@ public readonly maxConnectionLifetime: number; Maximum number of seconds a connection may be reused. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_connection_lifetime DatabaseSecretsMount#max_connection_lifetime} --- @@ -6811,7 +6888,7 @@ public readonly maxIdleConnections: number; Maximum number of idle connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_idle_connections DatabaseSecretsMount#max_idle_connections} --- @@ -6825,7 +6902,7 @@ public readonly maxOpenConnections: number; Maximum number of open connections to the database. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#max_open_connections DatabaseSecretsMount#max_open_connections} --- @@ -6839,7 +6916,7 @@ public readonly password: string; The root credential password used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#password DatabaseSecretsMount#password} --- @@ -6855,7 +6932,7 @@ Specifies the name of the plugin to use for this connection. Must be prefixed with the name of one of the supported database engine types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#plugin_name DatabaseSecretsMount#plugin_name} --- @@ -6869,7 +6946,7 @@ public readonly rootRotationStatements: string[]; A list of database statements to be executed to rotate the root user's credentials. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#root_rotation_statements DatabaseSecretsMount#root_rotation_statements} --- @@ -6883,7 +6960,7 @@ public readonly username: string; The root credential username used in the connection URL. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username DatabaseSecretsMount#username} --- @@ -6897,7 +6974,7 @@ public readonly usernameTemplate: string; Username generation template. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#username_template DatabaseSecretsMount#username_template} --- @@ -6911,7 +6988,7 @@ public readonly verifyConnection: boolean | IResolvable; Specifies if the connection is verified during initial configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/database_secrets_mount#verify_connection DatabaseSecretsMount#verify_connection} --- @@ -7157,6 +7234,7 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | resetPort | *No description.* | | resetProtocolVersion | *No description.* | | resetRootRotationStatements | *No description.* | +| resetSkipVerification | *No description.* | | resetTls | *No description.* | | resetUsername | *No description.* | | resetVerifyConnection | *No description.* | @@ -7385,6 +7463,12 @@ public resetProtocolVersion(): void public resetRootRotationStatements(): void ``` +##### `resetSkipVerification` + +```typescript +public resetSkipVerification(): void +``` + ##### `resetTls` ```typescript @@ -7423,6 +7507,7 @@ public resetVerifyConnection(): void | portInput | number | *No description.* | | protocolVersionInput | number | *No description.* | | rootRotationStatementsInput | string[] | *No description.* | +| skipVerificationInput | boolean \| cdktf.IResolvable | *No description.* | | tlsInput | boolean \| cdktf.IResolvable | *No description.* | | usernameInput | string | *No description.* | | verifyConnectionInput | boolean \| cdktf.IResolvable | *No description.* | @@ -7439,6 +7524,7 @@ public resetVerifyConnection(): void | port | number | *No description.* | | protocolVersion | number | *No description.* | | rootRotationStatements | string[] | *No description.* | +| skipVerification | boolean \| cdktf.IResolvable | *No description.* | | tls | boolean \| cdktf.IResolvable | *No description.* | | username | string | *No description.* | | verifyConnection | boolean \| cdktf.IResolvable | *No description.* | @@ -7600,6 +7686,16 @@ public readonly rootRotationStatementsInput: string[]; --- +##### `skipVerificationInput`Optional + +```typescript +public readonly skipVerificationInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `tlsInput`Optional ```typescript @@ -7760,6 +7856,16 @@ public readonly rootRotationStatements: string[]; --- +##### `skipVerification`Required + +```typescript +public readonly skipVerification: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `tls`Required ```typescript @@ -18186,8 +18292,12 @@ whether the list is wrapping a set (will add tolist() to be able to access an it | resetMaxOpenConnections | *No description.* | | resetPassword | *No description.* | | resetPluginName | *No description.* | +| resetPrivateKey | *No description.* | | resetRootRotationStatements | *No description.* | +| resetSelfManaged | *No description.* | | resetServiceAccountJson | *No description.* | +| resetTlsCa | *No description.* | +| resetTlsCertificate | *No description.* | | resetUsername | *No description.* | | resetUsernameTemplate | *No description.* | | resetVerifyConnection | *No description.* | @@ -18404,18 +18514,42 @@ public resetPassword(): void public resetPluginName(): void ``` +##### `resetPrivateKey` + +```typescript +public resetPrivateKey(): void +``` + ##### `resetRootRotationStatements` ```typescript public resetRootRotationStatements(): void ``` +##### `resetSelfManaged` + +```typescript +public resetSelfManaged(): void +``` + ##### `resetServiceAccountJson` ```typescript public resetServiceAccountJson(): void ``` +##### `resetTlsCa` + +```typescript +public resetTlsCa(): void +``` + +##### `resetTlsCertificate` + +```typescript +public resetTlsCertificate(): void +``` + ##### `resetUsername` ```typescript @@ -18452,8 +18586,12 @@ public resetVerifyConnection(): void | nameInput | string | *No description.* | | passwordInput | string | *No description.* | | pluginNameInput | string | *No description.* | +| privateKeyInput | string | *No description.* | | rootRotationStatementsInput | string[] | *No description.* | +| selfManagedInput | boolean \| cdktf.IResolvable | *No description.* | | serviceAccountJsonInput | string | *No description.* | +| tlsCaInput | string | *No description.* | +| tlsCertificateInput | string | *No description.* | | usernameInput | string | *No description.* | | usernameTemplateInput | string | *No description.* | | verifyConnectionInput | boolean \| cdktf.IResolvable | *No description.* | @@ -18468,8 +18606,12 @@ public resetVerifyConnection(): void | name | string | *No description.* | | password | string | *No description.* | | pluginName | string | *No description.* | +| privateKey | string | *No description.* | | rootRotationStatements | string[] | *No description.* | +| selfManaged | boolean \| cdktf.IResolvable | *No description.* | | serviceAccountJson | string | *No description.* | +| tlsCa | string | *No description.* | +| tlsCertificate | string | *No description.* | | username | string | *No description.* | | usernameTemplate | string | *No description.* | | verifyConnection | boolean \| cdktf.IResolvable | *No description.* | @@ -18611,6 +18753,16 @@ public readonly pluginNameInput: string; --- +##### `privateKeyInput`Optional + +```typescript +public readonly privateKeyInput: string; +``` + +- *Type:* string + +--- + ##### `rootRotationStatementsInput`Optional ```typescript @@ -18621,6 +18773,16 @@ public readonly rootRotationStatementsInput: string[]; --- +##### `selfManagedInput`Optional + +```typescript +public readonly selfManagedInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `serviceAccountJsonInput`Optional ```typescript @@ -18631,6 +18793,26 @@ public readonly serviceAccountJsonInput: string; --- +##### `tlsCaInput`Optional + +```typescript +public readonly tlsCaInput: string; +``` + +- *Type:* string + +--- + +##### `tlsCertificateInput`Optional + +```typescript +public readonly tlsCertificateInput: string; +``` + +- *Type:* string + +--- + ##### `usernameInput`Optional ```typescript @@ -18771,6 +18953,16 @@ public readonly pluginName: string; --- +##### `privateKey`Required + +```typescript +public readonly privateKey: string; +``` + +- *Type:* string + +--- + ##### `rootRotationStatements`Required ```typescript @@ -18781,6 +18973,16 @@ public readonly rootRotationStatements: string[]; --- +##### `selfManaged`Required + +```typescript +public readonly selfManaged: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `serviceAccountJson`Required ```typescript @@ -18791,6 +18993,26 @@ public readonly serviceAccountJson: string; --- +##### `tlsCa`Required + +```typescript +public readonly tlsCa: string; +``` + +- *Type:* string + +--- + +##### `tlsCertificate`Required + +```typescript +public readonly tlsCertificate: string; +``` + +- *Type:* string + +--- + ##### `username`Required ```typescript diff --git a/docs/egpPolicy.csharp.md b/docs/egpPolicy.csharp.md index 5894884a..124dd3c9 100644 --- a/docs/egpPolicy.csharp.md +++ b/docs/egpPolicy.csharp.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ new EgpPolicyConfig { | Name | string | Name of the policy. | | Paths | string[] | List of paths to which the policy will be applied. | | Policy | string | The policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -932,7 +932,7 @@ public string EnforcementLevel { get; set; } Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -946,7 +946,7 @@ public string Name { get; set; } Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -960,7 +960,7 @@ public string[] Paths { get; set; } List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -974,7 +974,7 @@ public string Policy { get; set; } The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.go.md b/docs/egpPolicy.go.md index 885d45e0..efc82be3 100644 --- a/docs/egpPolicy.go.md +++ b/docs/egpPolicy.go.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/egppolicy" | Name | *string | Name of the policy. | | Paths | *[]*string | List of paths to which the policy will be applied. | | Policy | *string | The policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -932,7 +932,7 @@ EnforcementLevel *string Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -946,7 +946,7 @@ Name *string Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -960,7 +960,7 @@ Paths *[]*string List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -974,7 +974,7 @@ Policy *string The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.java.md b/docs/egpPolicy.java.md index a10c98df..a7329c66 100644 --- a/docs/egpPolicy.java.md +++ b/docs/egpPolicy.java.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -47,7 +47,7 @@ EgpPolicy.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the policy. | | paths | java.util.List | List of paths to which the policy will be applied. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- @@ -610,7 +610,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ EgpPolicyConfig.builder() | name | java.lang.String | Name of the policy. | | paths | java.util.List | List of paths to which the policy will be applied. | | policy | java.lang.String | The policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1065,7 +1065,7 @@ public java.lang.String getEnforcementLevel(); Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -1079,7 +1079,7 @@ public java.lang.String getName(); Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -1093,7 +1093,7 @@ public java.util.List getPaths(); List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -1107,7 +1107,7 @@ public java.lang.String getPolicy(); The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.python.md b/docs/egpPolicy.python.md index 4d00965e..00484fea 100644 --- a/docs/egpPolicy.python.md +++ b/docs/egpPolicy.python.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -45,7 +45,7 @@ egpPolicy.EgpPolicy( | name | str | Name of the policy. | | paths | typing.List[str] | List of paths to which the policy will be applied. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- @@ -654,7 +654,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -1020,7 +1020,7 @@ egpPolicy.EgpPolicyConfig( | name | str | Name of the policy. | | paths | typing.List[str] | List of paths to which the policy will be applied. | | policy | str | The policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1105,7 +1105,7 @@ enforcement_level: str Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -1119,7 +1119,7 @@ name: str Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -1133,7 +1133,7 @@ paths: typing.List[str] List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -1147,7 +1147,7 @@ policy: str The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/egpPolicy.typescript.md b/docs/egpPolicy.typescript.md index c1879217..a1ff1aa4 100644 --- a/docs/egpPolicy.typescript.md +++ b/docs/egpPolicy.typescript.md @@ -4,7 +4,7 @@ ### EgpPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy vault_egp_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy vault_egp_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the EgpPolicy to import. The id of the existing EgpPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#import import section} in the documentation of this resource for the id to use --- @@ -833,7 +833,7 @@ const egpPolicyConfig: egpPolicy.EgpPolicyConfig = { ... } | name | string | Name of the policy. | | paths | string[] | List of paths to which the policy will be applied. | | policy | string | The policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -918,7 +918,7 @@ public readonly enforcementLevel: string; Enforcement level of Sentinel policy. Can be one of: 'advisory', 'soft-mandatory' or 'hard-mandatory'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#enforcement_level EgpPolicy#enforcement_level} --- @@ -932,7 +932,7 @@ public readonly name: string; Name of the policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#name EgpPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#name EgpPolicy#name} --- @@ -946,7 +946,7 @@ public readonly paths: string[]; List of paths to which the policy will be applied. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#paths EgpPolicy#paths} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#paths EgpPolicy#paths} --- @@ -960,7 +960,7 @@ public readonly policy: string; The policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#policy EgpPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#policy EgpPolicy#policy} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#id EgpPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#id EgpPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/egp_policy#namespace EgpPolicy#namespace} --- diff --git a/docs/gcpAuthBackend.csharp.md b/docs/gcpAuthBackend.csharp.md index aaf2d9bf..b4f83b0f 100644 --- a/docs/gcpAuthBackend.csharp.md +++ b/docs/gcpAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1238,23 +1238,23 @@ new GcpAuthBackendConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| ClientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| ClientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| Credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| ClientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| ClientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| Credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | CustomEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | IdentityTokenAudience | string | The audience claim value for plugin identity tokens. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | IdentityTokenTtl | double | The TTL of generated tokens. | | Local | object | Specifies if the auth method is local only. | | Namespace | string | Target namespace. (requires Enterprise). | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| PrivateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| ProjectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| PrivateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| ProjectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | ServiceAccountEmail | string | Service Account to impersonate for plugin workload identity federation. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1336,7 +1336,7 @@ public string ClientEmail { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1348,7 +1348,7 @@ public string ClientId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1360,7 +1360,7 @@ public string Credentials { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1374,7 +1374,7 @@ public GcpAuthBackendCustomEndpoint CustomEndpoint { get; set; } custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1386,7 +1386,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1400,7 +1400,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1412,7 +1412,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1429,7 +1429,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -1443,7 +1443,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -1457,7 +1457,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -1471,7 +1471,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1485,7 +1485,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1497,7 +1497,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1509,7 +1509,7 @@ public string PrivateKeyId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1521,7 +1521,7 @@ public string ProjectId { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1535,7 +1535,7 @@ public string ServiceAccountEmail { get; set; } Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -1547,7 +1547,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1587,7 +1587,7 @@ public string Api { get; set; } Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1601,7 +1601,7 @@ public string Compute { get; set; } Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1615,7 +1615,7 @@ public string Crm { get; set; } Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1629,7 +1629,7 @@ public string Iam { get; set; } Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1656,14 +1656,14 @@ new GcpAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1675,7 +1675,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1687,7 +1687,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1699,7 +1699,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1711,7 +1711,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1723,7 +1723,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1735,7 +1735,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1747,7 +1747,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1759,7 +1759,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.go.md b/docs/gcpAuthBackend.go.md index 45a59518..34279faf 100644 --- a/docs/gcpAuthBackend.go.md +++ b/docs/gcpAuthBackend.go.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1238,23 +1238,23 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| ClientEmail | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| ClientId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| Credentials | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| ClientEmail | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| ClientId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| Credentials | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | CustomEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | IdentityTokenAudience | *string | The audience claim value for plugin identity tokens. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | IdentityTokenTtl | *f64 | The TTL of generated tokens. | | Local | interface{} | Specifies if the auth method is local only. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| PrivateKeyId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| ProjectId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| PrivateKeyId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| ProjectId | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | ServiceAccountEmail | *string | Service Account to impersonate for plugin workload identity federation. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1336,7 +1336,7 @@ ClientEmail *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1348,7 +1348,7 @@ ClientId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1360,7 +1360,7 @@ Credentials *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1374,7 +1374,7 @@ CustomEndpoint GcpAuthBackendCustomEndpoint custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1386,7 +1386,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1400,7 +1400,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1412,7 +1412,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1429,7 +1429,7 @@ IdentityTokenAudience *string The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -1443,7 +1443,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -1457,7 +1457,7 @@ IdentityTokenTtl *f64 The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -1471,7 +1471,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1485,7 +1485,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1497,7 +1497,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1509,7 +1509,7 @@ PrivateKeyId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1521,7 +1521,7 @@ ProjectId *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1535,7 +1535,7 @@ ServiceAccountEmail *string Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -1547,7 +1547,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1587,7 +1587,7 @@ Api *string Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1601,7 +1601,7 @@ Compute *string Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1615,7 +1615,7 @@ Crm *string Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1629,7 +1629,7 @@ Iam *string Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1656,14 +1656,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1675,7 +1675,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1687,7 +1687,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1699,7 +1699,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1711,7 +1711,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1723,7 +1723,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1735,7 +1735,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1747,7 +1747,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1759,7 +1759,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.java.md b/docs/gcpAuthBackend.java.md index 305008f9..e3c2b4d8 100644 --- a/docs/gcpAuthBackend.java.md +++ b/docs/gcpAuthBackend.java.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -57,23 +57,23 @@ GcpAuthBackend.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value for plugin identity tokens. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated tokens. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | serviceAccountEmail | java.lang.String | Service Account to impersonate for plugin workload identity federation. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -141,7 +141,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -860,7 +860,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1493,23 +1493,23 @@ GcpAuthBackendConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value for plugin identity tokens. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated tokens. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | serviceAccountEmail | java.lang.String | Service Account to impersonate for plugin workload identity federation. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1591,7 +1591,7 @@ public java.lang.String getClientEmail(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1603,7 +1603,7 @@ public java.lang.String getClientId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1615,7 +1615,7 @@ public java.lang.String getCredentials(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1629,7 +1629,7 @@ public GcpAuthBackendCustomEndpoint getCustomEndpoint(); custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1641,7 +1641,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1655,7 +1655,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1667,7 +1667,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1684,7 +1684,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -1698,7 +1698,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -1712,7 +1712,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -1726,7 +1726,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1740,7 +1740,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1752,7 +1752,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1764,7 +1764,7 @@ public java.lang.String getPrivateKeyId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1776,7 +1776,7 @@ public java.lang.String getProjectId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1790,7 +1790,7 @@ public java.lang.String getServiceAccountEmail(); Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -1802,7 +1802,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GcpAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1842,7 +1842,7 @@ public java.lang.String getApi(); Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1856,7 +1856,7 @@ public java.lang.String getCompute(); Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1870,7 +1870,7 @@ public java.lang.String getCrm(); Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1884,7 +1884,7 @@ public java.lang.String getIam(); Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1911,14 +1911,14 @@ GcpAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1930,7 +1930,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1942,7 +1942,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1954,7 +1954,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1966,7 +1966,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1978,7 +1978,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1990,7 +1990,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -2002,7 +2002,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -2014,7 +2014,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.python.md b/docs/gcpAuthBackend.python.md index 3811252f..0c424f02 100644 --- a/docs/gcpAuthBackend.python.md +++ b/docs/gcpAuthBackend.python.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -52,23 +52,23 @@ gcpAuthBackend.GcpAuthBackend( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | custom_endpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | identity_token_audience | str | The audience claim value for plugin identity tokens. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated tokens. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | service_account_email | str | Service Account to impersonate for plugin workload identity federation. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -678,7 +678,7 @@ def put_custom_endpoint( Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -688,7 +688,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -698,7 +698,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -708,7 +708,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -942,7 +942,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1568,23 +1568,23 @@ gcpAuthBackend.GcpAuthBackendConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| client_email | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| client_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | custom_endpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | identity_token_audience | str | The audience claim value for plugin identity tokens. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated tokens. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| private_key_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| project_id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | service_account_email | str | Service Account to impersonate for plugin workload identity federation. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1666,7 +1666,7 @@ client_email: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1678,7 +1678,7 @@ client_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1690,7 +1690,7 @@ credentials: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1704,7 +1704,7 @@ custom_endpoint: GcpAuthBackendCustomEndpoint custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1716,7 +1716,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1730,7 +1730,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1742,7 +1742,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1759,7 +1759,7 @@ identity_token_audience: str The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -1773,7 +1773,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -1787,7 +1787,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -1801,7 +1801,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1815,7 +1815,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1827,7 +1827,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1839,7 +1839,7 @@ private_key_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1851,7 +1851,7 @@ project_id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1865,7 +1865,7 @@ service_account_email: str Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -1877,7 +1877,7 @@ tune: typing.Union[IResolvable, typing.List[GcpAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[GcpAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1917,7 +1917,7 @@ api: str Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1931,7 +1931,7 @@ compute: str Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1945,7 +1945,7 @@ crm: str Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1959,7 +1959,7 @@ iam: str Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1986,14 +1986,14 @@ gcpAuthBackend.GcpAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -2005,7 +2005,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -2017,7 +2017,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -2029,7 +2029,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -2041,7 +2041,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -2053,7 +2053,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -2065,7 +2065,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -2077,7 +2077,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -2089,7 +2089,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackend.typescript.md b/docs/gcpAuthBackend.typescript.md index cb8d37f2..e3209d0a 100644 --- a/docs/gcpAuthBackend.typescript.md +++ b/docs/gcpAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### GcpAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend vault_gcp_auth_backend}. #### Initializers @@ -612,7 +612,7 @@ The construct id used in the generated config for the GcpAuthBackend to import. The id of the existing GcpAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1213,23 +1213,23 @@ const gcpAuthBackendConfig: gcpAuthBackend.GcpAuthBackendConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| clientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | -| clientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | -| credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | +| clientEmail | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. | +| clientId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. | +| credentials | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. | | customEndpoint | GcpAuthBackendCustomEndpoint | custom_endpoint block. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. | | identityTokenAudience | string | The audience claim value for plugin identity tokens. | | identityTokenKey | string | The key to use for signing identity tokens. | | identityTokenTtl | number | The TTL of generated tokens. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | | namespace | string | Target namespace. (requires Enterprise). | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | -| privateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | -| projectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. | +| privateKeyId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. | +| projectId | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. | | serviceAccountEmail | string | Service Account to impersonate for plugin workload identity federation. | -| tune | cdktf.IResolvable \| GcpAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | +| tune | cdktf.IResolvable \| GcpAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. | --- @@ -1311,7 +1311,7 @@ public readonly clientEmail: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_email GcpAuthBackend#client_email}. --- @@ -1323,7 +1323,7 @@ public readonly clientId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#client_id GcpAuthBackend#client_id}. --- @@ -1335,7 +1335,7 @@ public readonly credentials: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#credentials GcpAuthBackend#credentials}. --- @@ -1349,7 +1349,7 @@ public readonly customEndpoint: GcpAuthBackendCustomEndpoint; custom_endpoint block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#custom_endpoint GcpAuthBackend#custom_endpoint} --- @@ -1361,7 +1361,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#description GcpAuthBackend#description}. --- @@ -1375,7 +1375,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#disable_remount GcpAuthBackend#disable_remount} --- @@ -1387,7 +1387,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#id GcpAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1404,7 +1404,7 @@ public readonly identityTokenAudience: string; The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_audience GcpAuthBackend#identity_token_audience} --- @@ -1418,7 +1418,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_key GcpAuthBackend#identity_token_key} --- @@ -1432,7 +1432,7 @@ public readonly identityTokenTtl: number; The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#identity_token_ttl GcpAuthBackend#identity_token_ttl} --- @@ -1446,7 +1446,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#local GcpAuthBackend#local} --- @@ -1460,7 +1460,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#namespace GcpAuthBackend#namespace} --- @@ -1472,7 +1472,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#path GcpAuthBackend#path}. --- @@ -1484,7 +1484,7 @@ public readonly privateKeyId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#private_key_id GcpAuthBackend#private_key_id}. --- @@ -1496,7 +1496,7 @@ public readonly projectId: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#project_id GcpAuthBackend#project_id}. --- @@ -1510,7 +1510,7 @@ public readonly serviceAccountEmail: string; Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#service_account_email GcpAuthBackend#service_account_email} --- @@ -1522,7 +1522,7 @@ public readonly tune: IResolvable | GcpAuthBackendTune[]; - *Type:* cdktf.IResolvable | GcpAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#tune GcpAuthBackend#tune}. --- @@ -1557,7 +1557,7 @@ public readonly api: string; Replaces the service endpoint used in API requests to https://www.googleapis.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#api GcpAuthBackend#api} --- @@ -1571,7 +1571,7 @@ public readonly compute: string; Replaces the service endpoint used in API requests to `https://compute.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#compute GcpAuthBackend#compute} --- @@ -1585,7 +1585,7 @@ public readonly crm: string; Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#crm GcpAuthBackend#crm} --- @@ -1599,7 +1599,7 @@ public readonly iam: string; Replaces the service endpoint used in API requests to `https://iam.googleapis.com`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#iam GcpAuthBackend#iam} --- @@ -1617,14 +1617,14 @@ const gcpAuthBackendTune: gcpAuthBackend.GcpAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. | --- @@ -1636,7 +1636,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#allowed_response_headers GcpAuthBackend#allowed_response_headers}. --- @@ -1648,7 +1648,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_request_keys GcpAuthBackend#audit_non_hmac_request_keys}. --- @@ -1660,7 +1660,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#audit_non_hmac_response_keys GcpAuthBackend#audit_non_hmac_response_keys}. --- @@ -1672,7 +1672,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#default_lease_ttl GcpAuthBackend#default_lease_ttl}. --- @@ -1684,7 +1684,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#listing_visibility GcpAuthBackend#listing_visibility}. --- @@ -1696,7 +1696,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#max_lease_ttl GcpAuthBackend#max_lease_ttl}. --- @@ -1708,7 +1708,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#passthrough_request_headers GcpAuthBackend#passthrough_request_headers}. --- @@ -1720,7 +1720,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend#token_type GcpAuthBackend#token_type}. --- diff --git a/docs/gcpAuthBackendRole.csharp.md b/docs/gcpAuthBackendRole.csharp.md index 6ca5ee19..609b6092 100644 --- a/docs/gcpAuthBackendRole.csharp.md +++ b/docs/gcpAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1367,19 +1367,19 @@ new GcpAuthBackendRoleConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| Type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| AddGroupAliases | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| AllowGceInference | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| BoundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| BoundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| BoundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| BoundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| BoundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| BoundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| MaxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| Role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| Type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| AddGroupAliases | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| AllowGceInference | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| BoundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| BoundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| BoundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| BoundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| BoundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| BoundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| MaxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1471,7 +1471,7 @@ public string Role { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1483,7 +1483,7 @@ public string Type { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1495,7 +1495,7 @@ public object AddGroupAliases { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1507,7 +1507,7 @@ public object AllowGceInference { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1519,7 +1519,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1531,7 +1531,7 @@ public string[] BoundInstanceGroups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1543,7 +1543,7 @@ public string[] BoundLabels { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1555,7 +1555,7 @@ public string[] BoundProjects { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1567,7 +1567,7 @@ public string[] BoundRegions { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1579,7 +1579,7 @@ public string[] BoundServiceAccounts { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1591,7 +1591,7 @@ public string[] BoundZones { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1603,7 +1603,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1618,7 +1618,7 @@ public string MaxJwtExp { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1632,7 +1632,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1646,7 +1646,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1660,7 +1660,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1674,7 +1674,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1688,7 +1688,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1702,7 +1702,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1716,7 +1716,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1730,7 +1730,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1744,7 +1744,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1758,7 +1758,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.go.md b/docs/gcpAuthBackendRole.go.md index 594fe4ca..8a45f832 100644 --- a/docs/gcpAuthBackendRole.go.md +++ b/docs/gcpAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1367,19 +1367,19 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpauthbackendrole" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Role | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| Type | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| AddGroupAliases | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| AllowGceInference | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| BoundInstanceGroups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| BoundLabels | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| BoundProjects | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| BoundRegions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| BoundServiceAccounts | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| BoundZones | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| MaxJwtExp | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| Role | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| Type | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| AddGroupAliases | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| AllowGceInference | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| BoundInstanceGroups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| BoundLabels | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| BoundProjects | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| BoundRegions | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| BoundServiceAccounts | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| BoundZones | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| MaxJwtExp | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1471,7 +1471,7 @@ Role *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1483,7 +1483,7 @@ Type *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1495,7 +1495,7 @@ AddGroupAliases interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1507,7 +1507,7 @@ AllowGceInference interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1519,7 +1519,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1531,7 +1531,7 @@ BoundInstanceGroups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1543,7 +1543,7 @@ BoundLabels *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1555,7 +1555,7 @@ BoundProjects *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1567,7 +1567,7 @@ BoundRegions *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1579,7 +1579,7 @@ BoundServiceAccounts *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1591,7 +1591,7 @@ BoundZones *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1603,7 +1603,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1618,7 +1618,7 @@ MaxJwtExp *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1632,7 +1632,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1646,7 +1646,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1660,7 +1660,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1674,7 +1674,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1688,7 +1688,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1702,7 +1702,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1716,7 +1716,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1730,7 +1730,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1744,7 +1744,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1758,7 +1758,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.java.md b/docs/gcpAuthBackendRole.java.md index 03070b03..b3ca7f6d 100644 --- a/docs/gcpAuthBackendRole.java.md +++ b/docs/gcpAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -63,19 +63,19 @@ GcpAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -153,7 +153,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -252,7 +252,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -262,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -272,7 +272,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -282,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -292,7 +292,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -302,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -312,7 +312,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -322,7 +322,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -332,7 +332,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -342,7 +342,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -352,7 +352,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- @@ -926,7 +926,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1686,19 +1686,19 @@ GcpAuthBackendRoleConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1790,7 +1790,7 @@ public java.lang.String getRole(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1802,7 +1802,7 @@ public java.lang.String getType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1814,7 +1814,7 @@ public java.lang.Object getAddGroupAliases(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1826,7 +1826,7 @@ public java.lang.Object getAllowGceInference(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1838,7 +1838,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1850,7 +1850,7 @@ public java.util.List getBoundInstanceGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1862,7 +1862,7 @@ public java.util.List getBoundLabels(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1874,7 +1874,7 @@ public java.util.List getBoundProjects(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1886,7 +1886,7 @@ public java.util.List getBoundRegions(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1898,7 +1898,7 @@ public java.util.List getBoundServiceAccounts(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1910,7 +1910,7 @@ public java.util.List getBoundZones(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1922,7 +1922,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1937,7 +1937,7 @@ public java.lang.String getMaxJwtExp(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1951,7 +1951,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1965,7 +1965,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1979,7 +1979,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1993,7 +1993,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -2007,7 +2007,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -2021,7 +2021,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -2035,7 +2035,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -2049,7 +2049,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -2063,7 +2063,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -2077,7 +2077,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.python.md b/docs/gcpAuthBackendRole.python.md index 5d01aca9..6904d351 100644 --- a/docs/gcpAuthBackendRole.python.md +++ b/docs/gcpAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -58,19 +58,19 @@ gcpAuthBackendRole.GcpAuthBackendRole( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -247,7 +247,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -257,7 +257,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -267,7 +267,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -297,7 +297,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -317,7 +317,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -327,7 +327,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -337,7 +337,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- @@ -967,7 +967,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1720,19 +1720,19 @@ gcpAuthBackendRole.GcpAuthBackendRoleConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| add_group_aliases | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allow_gce_inference | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| bound_instance_groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| bound_labels | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| bound_projects | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| bound_regions | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| bound_service_accounts | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| bound_zones | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| max_jwt_exp | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1824,7 +1824,7 @@ role: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1836,7 +1836,7 @@ type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1848,7 +1848,7 @@ add_group_aliases: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1860,7 +1860,7 @@ allow_gce_inference: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1872,7 +1872,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1884,7 +1884,7 @@ bound_instance_groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1896,7 +1896,7 @@ bound_labels: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1908,7 +1908,7 @@ bound_projects: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1920,7 +1920,7 @@ bound_regions: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1932,7 +1932,7 @@ bound_service_accounts: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1944,7 +1944,7 @@ bound_zones: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1956,7 +1956,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1971,7 +1971,7 @@ max_jwt_exp: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1985,7 +1985,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1999,7 +1999,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -2013,7 +2013,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -2027,7 +2027,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -2041,7 +2041,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -2055,7 +2055,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -2069,7 +2069,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -2083,7 +2083,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -2097,7 +2097,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -2111,7 +2111,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpAuthBackendRole.typescript.md b/docs/gcpAuthBackendRole.typescript.md index 2165fa29..fb6398e0 100644 --- a/docs/gcpAuthBackendRole.typescript.md +++ b/docs/gcpAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### GcpAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role vault_gcp_auth_backend_role}. #### Initializers @@ -614,7 +614,7 @@ The construct id used in the generated config for the GcpAuthBackendRole to impo The id of the existing GcpAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1336,19 +1336,19 @@ const gcpAuthBackendRoleConfig: gcpAuthBackendRole.GcpAuthBackendRoleConfig = { | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | -| type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | -| addGroupAliases | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | -| allowGceInference | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | -| boundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | -| boundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | -| boundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | -| boundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | -| boundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | -| boundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | -| maxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | +| role | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. | +| type | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. | +| addGroupAliases | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. | +| allowGceInference | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. | +| boundInstanceGroups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. | +| boundLabels | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. | +| boundProjects | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. | +| boundRegions | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. | +| boundServiceAccounts | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. | +| boundZones | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. | +| maxJwtExp | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1440,7 +1440,7 @@ public readonly role: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#role GcpAuthBackendRole#role}. --- @@ -1452,7 +1452,7 @@ public readonly type: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#type GcpAuthBackendRole#type}. --- @@ -1464,7 +1464,7 @@ public readonly addGroupAliases: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#add_group_aliases GcpAuthBackendRole#add_group_aliases}. --- @@ -1476,7 +1476,7 @@ public readonly allowGceInference: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#allow_gce_inference GcpAuthBackendRole#allow_gce_inference}. --- @@ -1488,7 +1488,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#backend GcpAuthBackendRole#backend}. --- @@ -1500,7 +1500,7 @@ public readonly boundInstanceGroups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_instance_groups GcpAuthBackendRole#bound_instance_groups}. --- @@ -1512,7 +1512,7 @@ public readonly boundLabels: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_labels GcpAuthBackendRole#bound_labels}. --- @@ -1524,7 +1524,7 @@ public readonly boundProjects: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_projects GcpAuthBackendRole#bound_projects}. --- @@ -1536,7 +1536,7 @@ public readonly boundRegions: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_regions GcpAuthBackendRole#bound_regions}. --- @@ -1548,7 +1548,7 @@ public readonly boundServiceAccounts: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_service_accounts GcpAuthBackendRole#bound_service_accounts}. --- @@ -1560,7 +1560,7 @@ public readonly boundZones: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#bound_zones GcpAuthBackendRole#bound_zones}. --- @@ -1572,7 +1572,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#id GcpAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1587,7 +1587,7 @@ public readonly maxJwtExp: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#max_jwt_exp GcpAuthBackendRole#max_jwt_exp}. --- @@ -1601,7 +1601,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#namespace GcpAuthBackendRole#namespace} --- @@ -1615,7 +1615,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_bound_cidrs GcpAuthBackendRole#token_bound_cidrs} --- @@ -1629,7 +1629,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_explicit_max_ttl GcpAuthBackendRole#token_explicit_max_ttl} --- @@ -1643,7 +1643,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_max_ttl GcpAuthBackendRole#token_max_ttl} --- @@ -1657,7 +1657,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_no_default_policy GcpAuthBackendRole#token_no_default_policy} --- @@ -1671,7 +1671,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_num_uses GcpAuthBackendRole#token_num_uses} --- @@ -1685,7 +1685,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_period GcpAuthBackendRole#token_period} --- @@ -1699,7 +1699,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_policies GcpAuthBackendRole#token_policies} --- @@ -1713,7 +1713,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_ttl GcpAuthBackendRole#token_ttl} --- @@ -1727,7 +1727,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_auth_backend_role#token_type GcpAuthBackendRole#token_type} --- diff --git a/docs/gcpSecretBackend.csharp.md b/docs/gcpSecretBackend.csharp.md index d18b8c06..0a78eb91 100644 --- a/docs/gcpSecretBackend.csharp.md +++ b/docs/gcpSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1096,7 +1096,7 @@ new GcpSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | IdentityTokenAudience | string | The audience claim value for plugin identity tokens. | | IdentityTokenKey | string | The key to use for signing identity tokens. | | IdentityTokenTtl | double | The TTL of generated tokens. | @@ -1188,7 +1188,7 @@ public string Credentials { get; set; } JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1202,7 +1202,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1216,7 +1216,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1230,7 +1230,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1242,7 +1242,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1259,7 +1259,7 @@ public string IdentityTokenAudience { get; set; } The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -1273,7 +1273,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -1287,7 +1287,7 @@ public double IdentityTokenTtl { get; set; } The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -1301,7 +1301,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1315,7 +1315,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1329,7 +1329,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1343,7 +1343,7 @@ public string Path { get; set; } Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -1357,7 +1357,7 @@ public string ServiceAccountEmail { get; set; } Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- diff --git a/docs/gcpSecretBackend.go.md b/docs/gcpSecretBackend.go.md index ac4388fb..0d1f31da 100644 --- a/docs/gcpSecretBackend.go.md +++ b/docs/gcpSecretBackend.go.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1096,7 +1096,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | IdentityTokenAudience | *string | The audience claim value for plugin identity tokens. | | IdentityTokenKey | *string | The key to use for signing identity tokens. | | IdentityTokenTtl | *f64 | The TTL of generated tokens. | @@ -1188,7 +1188,7 @@ Credentials *string JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1202,7 +1202,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1216,7 +1216,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1230,7 +1230,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1242,7 +1242,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1259,7 +1259,7 @@ IdentityTokenAudience *string The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -1273,7 +1273,7 @@ IdentityTokenKey *string The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -1287,7 +1287,7 @@ IdentityTokenTtl *f64 The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -1301,7 +1301,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1315,7 +1315,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1329,7 +1329,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1343,7 +1343,7 @@ Path *string Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -1357,7 +1357,7 @@ ServiceAccountEmail *string Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- diff --git a/docs/gcpSecretBackend.java.md b/docs/gcpSecretBackend.java.md index 14b6a2f7..e7bbc7c6 100644 --- a/docs/gcpSecretBackend.java.md +++ b/docs/gcpSecretBackend.java.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -56,7 +56,7 @@ GcpSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value for plugin identity tokens. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated tokens. | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- @@ -773,7 +773,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1317,7 +1317,7 @@ GcpSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | identityTokenAudience | java.lang.String | The audience claim value for plugin identity tokens. | | identityTokenKey | java.lang.String | The key to use for signing identity tokens. | | identityTokenTtl | java.lang.Number | The TTL of generated tokens. | @@ -1409,7 +1409,7 @@ public java.lang.String getCredentials(); JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1423,7 +1423,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1437,7 +1437,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1451,7 +1451,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1463,7 +1463,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1480,7 +1480,7 @@ public java.lang.String getIdentityTokenAudience(); The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -1494,7 +1494,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -1508,7 +1508,7 @@ public java.lang.Number getIdentityTokenTtl(); The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -1522,7 +1522,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1536,7 +1536,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1550,7 +1550,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1564,7 +1564,7 @@ public java.lang.String getPath(); Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -1578,7 +1578,7 @@ public java.lang.String getServiceAccountEmail(); Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- diff --git a/docs/gcpSecretBackend.python.md b/docs/gcpSecretBackend.python.md index b82a281a..77cfade4 100644 --- a/docs/gcpSecretBackend.python.md +++ b/docs/gcpSecretBackend.python.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -52,7 +52,7 @@ gcpSecretBackend.GcpSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | identity_token_audience | str | The audience claim value for plugin identity tokens. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated tokens. | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- @@ -815,7 +815,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1353,7 +1353,7 @@ gcpSecretBackend.GcpSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | identity_token_audience | str | The audience claim value for plugin identity tokens. | | identity_token_key | str | The key to use for signing identity tokens. | | identity_token_ttl | typing.Union[int, float] | The TTL of generated tokens. | @@ -1445,7 +1445,7 @@ credentials: str JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1459,7 +1459,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1473,7 +1473,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1487,7 +1487,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1499,7 +1499,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1516,7 +1516,7 @@ identity_token_audience: str The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -1530,7 +1530,7 @@ identity_token_key: str The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -1544,7 +1544,7 @@ identity_token_ttl: typing.Union[int, float] The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -1558,7 +1558,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1572,7 +1572,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1586,7 +1586,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1600,7 +1600,7 @@ path: str Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -1614,7 +1614,7 @@ service_account_email: str Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- diff --git a/docs/gcpSecretBackend.typescript.md b/docs/gcpSecretBackend.typescript.md index 586aecb0..803d7335 100644 --- a/docs/gcpSecretBackend.typescript.md +++ b/docs/gcpSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend vault_gcp_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the GcpSecretBackend to import The id of the existing GcpSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ const gcpSecretBackendConfig: gcpSecretBackend.GcpSecretBackendConfig = { ... } | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. | | identityTokenAudience | string | The audience claim value for plugin identity tokens. | | identityTokenKey | string | The key to use for signing identity tokens. | | identityTokenTtl | number | The TTL of generated tokens. | @@ -1167,7 +1167,7 @@ public readonly credentials: string; JSON-encoded credentials to use to connect to GCP. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#credentials GcpSecretBackend#credentials} --- @@ -1181,7 +1181,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#default_lease_ttl_seconds GcpSecretBackend#default_lease_ttl_seconds} --- @@ -1195,7 +1195,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#description GcpSecretBackend#description} --- @@ -1209,7 +1209,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#disable_remount GcpSecretBackend#disable_remount} --- @@ -1221,7 +1221,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#id GcpSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1238,7 +1238,7 @@ public readonly identityTokenAudience: string; The audience claim value for plugin identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_audience GcpSecretBackend#identity_token_audience} --- @@ -1252,7 +1252,7 @@ public readonly identityTokenKey: string; The key to use for signing identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_key GcpSecretBackend#identity_token_key} --- @@ -1266,7 +1266,7 @@ public readonly identityTokenTtl: number; The TTL of generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#identity_token_ttl GcpSecretBackend#identity_token_ttl} --- @@ -1280,7 +1280,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#local GcpSecretBackend#local} --- @@ -1294,7 +1294,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#max_lease_ttl_seconds GcpSecretBackend#max_lease_ttl_seconds} --- @@ -1308,7 +1308,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#namespace GcpSecretBackend#namespace} --- @@ -1322,7 +1322,7 @@ public readonly path: string; Path to mount the backend at. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#path GcpSecretBackend#path} --- @@ -1336,7 +1336,7 @@ public readonly serviceAccountEmail: string; Service Account to impersonate for plugin workload identity federation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_backend#service_account_email GcpSecretBackend#service_account_email} --- diff --git a/docs/gcpSecretImpersonatedAccount.csharp.md b/docs/gcpSecretImpersonatedAccount.csharp.md index 99392b58..860aa967 100644 --- a/docs/gcpSecretImpersonatedAccount.csharp.md +++ b/docs/gcpSecretImpersonatedAccount.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetNamespace | *No description.* | | ResetTokenScopes | *No description.* | +| ResetTtl | *No description.* | --- @@ -385,6 +386,12 @@ private void ResetNamespace() private void ResetTokenScopes() ``` +##### `ResetTtl` + +```csharp +private void ResetTtl() +``` + #### Static Functions | **Name** | **Description** | @@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | NamespaceInput | string | *No description.* | | ServiceAccountEmailInput | string | *No description.* | | TokenScopesInput | string[] | *No description.* | +| TtlInput | string | *No description.* | | Backend | string | *No description.* | | Id | string | *No description.* | | ImpersonatedAccount | string | *No description.* | | Namespace | string | *No description.* | | ServiceAccountEmail | string | *No description.* | | TokenScopes | string[] | *No description.* | +| Ttl | string | *No description.* | --- @@ -746,6 +755,16 @@ public string[] TokenScopesInput { get; } --- +##### `TtlInput`Optional + +```csharp +public string TtlInput { get; } +``` + +- *Type:* string + +--- + ##### `Backend`Required ```csharp @@ -806,6 +825,16 @@ public string[] TokenScopes { get; } --- +##### `Ttl`Required + +```csharp +public string Ttl { get; } +``` + +- *Type:* string + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -846,7 +875,8 @@ new GcpSecretImpersonatedAccountConfig { string ServiceAccountEmail, string Id = null, string Namespace = null, - string[] TokenScopes = null + string[] TokenScopes = null, + string Ttl = null }; ``` @@ -864,9 +894,10 @@ new GcpSecretImpersonatedAccountConfig { | Backend | string | Path where the GCP secrets engine is mounted. | | ImpersonatedAccount | string | Name of the Impersonated Account to create. | | ServiceAccountEmail | string | Email of the GCP service account. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| Ttl | string | Time to live. | --- @@ -950,7 +981,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -964,7 +995,7 @@ public string ImpersonatedAccount { get; set; } Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -978,7 +1009,7 @@ public string ServiceAccountEmail { get; set; } Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -990,7 +1021,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1007,7 +1038,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1021,7 +1052,21 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `Ttl`Optional + +```csharp +public string Ttl { get; set; } +``` + +- *Type:* string + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- diff --git a/docs/gcpSecretImpersonatedAccount.go.md b/docs/gcpSecretImpersonatedAccount.go.md index 0364e7ff..21bfdb80 100644 --- a/docs/gcpSecretImpersonatedAccount.go.md +++ b/docs/gcpSecretImpersonatedAccount.go.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | ResetId | *No description.* | | ResetNamespace | *No description.* | | ResetTokenScopes | *No description.* | +| ResetTtl | *No description.* | --- @@ -385,6 +386,12 @@ func ResetNamespace() func ResetTokenScopes() ``` +##### `ResetTtl` + +```go +func ResetTtl() +``` + #### Static Functions | **Name** | **Description** | @@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | NamespaceInput | *string | *No description.* | | ServiceAccountEmailInput | *string | *No description.* | | TokenScopesInput | *[]*string | *No description.* | +| TtlInput | *string | *No description.* | | Backend | *string | *No description.* | | Id | *string | *No description.* | | ImpersonatedAccount | *string | *No description.* | | Namespace | *string | *No description.* | | ServiceAccountEmail | *string | *No description.* | | TokenScopes | *[]*string | *No description.* | +| Ttl | *string | *No description.* | --- @@ -746,6 +755,16 @@ func TokenScopesInput() *[]*string --- +##### `TtlInput`Optional + +```go +func TtlInput() *string +``` + +- *Type:* *string + +--- + ##### `Backend`Required ```go @@ -806,6 +825,16 @@ func TokenScopes() *[]*string --- +##### `Ttl`Required + +```go +func Ttl() *string +``` + +- *Type:* *string + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -847,6 +876,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonated Id: *string, Namespace: *string, TokenScopes: *[]*string, + Ttl: *string, } ``` @@ -864,9 +894,10 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretimpersonated | Backend | *string | Path where the GCP secrets engine is mounted. | | ImpersonatedAccount | *string | Name of the Impersonated Account to create. | | ServiceAccountEmail | *string | Email of the GCP service account. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| Ttl | *string | Time to live. | --- @@ -950,7 +981,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -964,7 +995,7 @@ ImpersonatedAccount *string Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -978,7 +1009,7 @@ ServiceAccountEmail *string Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -990,7 +1021,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1007,7 +1038,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1021,7 +1052,21 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `Ttl`Optional + +```go +Ttl *string +``` + +- *Type:* *string + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- diff --git a/docs/gcpSecretImpersonatedAccount.java.md b/docs/gcpSecretImpersonatedAccount.java.md index b3cdd5b4..aa70cead 100644 --- a/docs/gcpSecretImpersonatedAccount.java.md +++ b/docs/gcpSecretImpersonatedAccount.java.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -29,6 +29,7 @@ GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id // .id(java.lang.String) // .namespace(java.lang.String) // .tokenScopes(java.util.List) +// .ttl(java.lang.String) .build(); ``` @@ -46,9 +47,10 @@ GcpSecretImpersonatedAccount.Builder.create(Construct scope, java.lang.String id | backend | java.lang.String | Path where the GCP secrets engine is mounted. | | impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | | serviceAccountEmail | java.lang.String | Email of the GCP service account. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| ttl | java.lang.String | Time to live. | --- @@ -118,7 +120,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -128,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -138,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -146,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -169,7 +171,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `ttl`Optional + +- *Type:* java.lang.String + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- @@ -203,6 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetId | *No description.* | | resetNamespace | *No description.* | | resetTokenScopes | *No description.* | +| resetTtl | *No description.* | --- @@ -514,6 +527,12 @@ public void resetNamespace() public void resetTokenScopes() ``` +##### `resetTtl` + +```java +public void resetTtl() +``` + #### Static Functions | **Name** | **Description** | @@ -617,7 +636,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -654,12 +673,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespaceInput | java.lang.String | *No description.* | | serviceAccountEmailInput | java.lang.String | *No description.* | | tokenScopesInput | java.util.List | *No description.* | +| ttlInput | java.lang.String | *No description.* | | backend | java.lang.String | *No description.* | | id | java.lang.String | *No description.* | | impersonatedAccount | java.lang.String | *No description.* | | namespace | java.lang.String | *No description.* | | serviceAccountEmail | java.lang.String | *No description.* | | tokenScopes | java.util.List | *No description.* | +| ttl | java.lang.String | *No description.* | --- @@ -875,6 +896,16 @@ public java.util.List getTokenScopesInput(); --- +##### `ttlInput`Optional + +```java +public java.lang.String getTtlInput(); +``` + +- *Type:* java.lang.String + +--- + ##### `backend`Required ```java @@ -935,6 +966,16 @@ public java.util.List getTokenScopes(); --- +##### `ttl`Required + +```java +public java.lang.String getTtl(); +``` + +- *Type:* java.lang.String + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -980,6 +1021,7 @@ GcpSecretImpersonatedAccountConfig.builder() // .id(java.lang.String) // .namespace(java.lang.String) // .tokenScopes(java.util.List) +// .ttl(java.lang.String) .build(); ``` @@ -997,9 +1039,10 @@ GcpSecretImpersonatedAccountConfig.builder() | backend | java.lang.String | Path where the GCP secrets engine is mounted. | | impersonatedAccount | java.lang.String | Name of the Impersonated Account to create. | | serviceAccountEmail | java.lang.String | Email of the GCP service account. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| ttl | java.lang.String | Time to live. | --- @@ -1083,7 +1126,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -1097,7 +1140,7 @@ public java.lang.String getImpersonatedAccount(); Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -1111,7 +1154,7 @@ public java.lang.String getServiceAccountEmail(); Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -1123,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1140,7 +1183,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1154,7 +1197,21 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `ttl`Optional + +```java +public java.lang.String getTtl(); +``` + +- *Type:* java.lang.String + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- diff --git a/docs/gcpSecretImpersonatedAccount.python.md b/docs/gcpSecretImpersonatedAccount.python.md index 326de6bf..101ce949 100644 --- a/docs/gcpSecretImpersonatedAccount.python.md +++ b/docs/gcpSecretImpersonatedAccount.python.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -26,7 +26,8 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount( service_account_email: str, id: str = None, namespace: str = None, - token_scopes: typing.List[str] = None + token_scopes: typing.List[str] = None, + ttl: str = None ) ``` @@ -44,9 +45,10 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccount( | backend | str | Path where the GCP secrets engine is mounted. | | impersonated_account | str | Name of the Impersonated Account to create. | | service_account_email | str | Email of the GCP service account. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| ttl | str | Time to live. | --- @@ -116,7 +118,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -126,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -136,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -167,7 +169,17 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `ttl`Optional + +- *Type:* str + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- @@ -201,6 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_id | *No description.* | | reset_namespace | *No description.* | | reset_token_scopes | *No description.* | +| reset_ttl | *No description.* | --- @@ -547,6 +560,12 @@ def reset_namespace() -> None def reset_token_scopes() -> None ``` +##### `reset_ttl` + +```python +def reset_ttl() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -661,7 +680,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -698,12 +717,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespace_input | str | *No description.* | | service_account_email_input | str | *No description.* | | token_scopes_input | typing.List[str] | *No description.* | +| ttl_input | str | *No description.* | | backend | str | *No description.* | | id | str | *No description.* | | impersonated_account | str | *No description.* | | namespace | str | *No description.* | | service_account_email | str | *No description.* | | token_scopes | typing.List[str] | *No description.* | +| ttl | str | *No description.* | --- @@ -919,6 +940,16 @@ token_scopes_input: typing.List[str] --- +##### `ttl_input`Optional + +```python +ttl_input: str +``` + +- *Type:* str + +--- + ##### `backend`Required ```python @@ -979,6 +1010,16 @@ token_scopes: typing.List[str] --- +##### `ttl`Required + +```python +ttl: str +``` + +- *Type:* str + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1019,7 +1060,8 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig( service_account_email: str, id: str = None, namespace: str = None, - token_scopes: typing.List[str] = None + token_scopes: typing.List[str] = None, + ttl: str = None ) ``` @@ -1037,9 +1079,10 @@ gcpSecretImpersonatedAccount.GcpSecretImpersonatedAccountConfig( | backend | str | Path where the GCP secrets engine is mounted. | | impersonated_account | str | Name of the Impersonated Account to create. | | service_account_email | str | Email of the GCP service account. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| ttl | str | Time to live. | --- @@ -1123,7 +1166,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -1137,7 +1180,7 @@ impersonated_account: str Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -1151,7 +1194,7 @@ service_account_email: str Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -1163,7 +1206,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1180,7 +1223,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1194,7 +1237,21 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `ttl`Optional + +```python +ttl: str +``` + +- *Type:* str + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- diff --git a/docs/gcpSecretImpersonatedAccount.typescript.md b/docs/gcpSecretImpersonatedAccount.typescript.md index 4e198d80..966e3893 100644 --- a/docs/gcpSecretImpersonatedAccount.typescript.md +++ b/docs/gcpSecretImpersonatedAccount.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretImpersonatedAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account vault_gcp_secret_impersonated_account}. #### Initializers @@ -76,6 +76,7 @@ Must be unique amongst siblings in the same scope | resetId | *No description.* | | resetNamespace | *No description.* | | resetTokenScopes | *No description.* | +| resetTtl | *No description.* | --- @@ -385,6 +386,12 @@ public resetNamespace(): void public resetTokenScopes(): void ``` +##### `resetTtl` + +```typescript +public resetTtl(): void +``` + #### Static Functions | **Name** | **Description** | @@ -488,7 +495,7 @@ The construct id used in the generated config for the GcpSecretImpersonatedAccou The id of the existing GcpSecretImpersonatedAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#import import section} in the documentation of this resource for the id to use --- @@ -525,12 +532,14 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespaceInput | string | *No description.* | | serviceAccountEmailInput | string | *No description.* | | tokenScopesInput | string[] | *No description.* | +| ttlInput | string | *No description.* | | backend | string | *No description.* | | id | string | *No description.* | | impersonatedAccount | string | *No description.* | | namespace | string | *No description.* | | serviceAccountEmail | string | *No description.* | | tokenScopes | string[] | *No description.* | +| ttl | string | *No description.* | --- @@ -746,6 +755,16 @@ public readonly tokenScopesInput: string[]; --- +##### `ttlInput`Optional + +```typescript +public readonly ttlInput: string; +``` + +- *Type:* string + +--- + ##### `backend`Required ```typescript @@ -806,6 +825,16 @@ public readonly tokenScopes: string[]; --- +##### `ttl`Required + +```typescript +public readonly ttl: string; +``` + +- *Type:* string + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -850,9 +879,10 @@ const gcpSecretImpersonatedAccountConfig: gcpSecretImpersonatedAccount.GcpSecret | backend | string | Path where the GCP secrets engine is mounted. | | impersonatedAccount | string | Name of the Impersonated Account to create. | | serviceAccountEmail | string | Email of the GCP service account. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). | +| ttl | string | Time to live. | --- @@ -936,7 +966,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#backend GcpSecretImpersonatedAccount#backend} --- @@ -950,7 +980,7 @@ public readonly impersonatedAccount: string; Name of the Impersonated Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#impersonated_account GcpSecretImpersonatedAccount#impersonated_account} --- @@ -964,7 +994,7 @@ public readonly serviceAccountEmail: string; Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#service_account_email GcpSecretImpersonatedAccount#service_account_email} --- @@ -976,7 +1006,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#id GcpSecretImpersonatedAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -993,7 +1023,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#namespace GcpSecretImpersonatedAccount#namespace} --- @@ -1007,7 +1037,21 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this impersonated account (`access_token` impersonated accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#token_scopes GcpSecretImpersonatedAccount#token_scopes} + +--- + +##### `ttl`Optional + +```typescript +public readonly ttl: string; +``` + +- *Type:* string + +Time to live. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_impersonated_account#ttl GcpSecretImpersonatedAccount#ttl} --- diff --git a/docs/gcpSecretRoleset.csharp.md b/docs/gcpSecretRoleset.csharp.md index 8f92c403..0a6e6504 100644 --- a/docs/gcpSecretRoleset.csharp.md +++ b/docs/gcpSecretRoleset.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -922,7 +922,7 @@ public string Resource { get; set; } Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -936,7 +936,7 @@ public string[] Roles { get; set; } List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -981,7 +981,7 @@ new GcpSecretRolesetConfig { | Binding | object | binding block. | | Project | string | Name of the GCP project that this roleset's service account will belong to. | | Roleset | string | Name of the RoleSet to create. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretType | string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1068,7 +1068,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1082,7 +1082,7 @@ public object Binding { get; set; } binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1096,7 +1096,7 @@ public string Project { get; set; } Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1110,7 +1110,7 @@ public string Roleset { get; set; } Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1139,7 +1139,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1153,7 +1153,7 @@ public string SecretType { get; set; } Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1167,7 +1167,7 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.go.md b/docs/gcpSecretRoleset.go.md index 8845acc4..50a6593f 100644 --- a/docs/gcpSecretRoleset.go.md +++ b/docs/gcpSecretRoleset.go.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -922,7 +922,7 @@ Resource *string Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -936,7 +936,7 @@ Roles *[]*string List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -981,7 +981,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretroleset" | Binding | interface{} | binding block. | | Project | *string | Name of the GCP project that this roleset's service account will belong to. | | Roleset | *string | Name of the RoleSet to create. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretType | *string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1068,7 +1068,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1082,7 +1082,7 @@ Binding interface{} binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1096,7 +1096,7 @@ Project *string Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1110,7 +1110,7 @@ Roleset *string Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1139,7 +1139,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1153,7 +1153,7 @@ SecretType *string Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1167,7 +1167,7 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.java.md b/docs/gcpSecretRoleset.java.md index 337b0461..ab0b4cce 100644 --- a/docs/gcpSecretRoleset.java.md +++ b/docs/gcpSecretRoleset.java.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -50,7 +50,7 @@ GcpSecretRoleset.Builder.create(Construct scope, java.lang.String id) | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding> | binding block. | | project | java.lang.String | Name of the GCP project that this roleset's service account will belong to. | | roleset | java.lang.String | Name of the RoleSet to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -1076,7 +1076,7 @@ public java.lang.String getResource(); Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -1090,7 +1090,7 @@ public java.util.List getRoles(); List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -1140,7 +1140,7 @@ GcpSecretRolesetConfig.builder() | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretRolesetBinding> | binding block. | | project | java.lang.String | Name of the GCP project that this roleset's service account will belong to. | | roleset | java.lang.String | Name of the RoleSet to create. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1227,7 +1227,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1241,7 +1241,7 @@ public java.lang.Object getBinding(); binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1255,7 +1255,7 @@ public java.lang.String getProject(); Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1269,7 +1269,7 @@ public java.lang.String getRoleset(); Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1281,7 +1281,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1298,7 +1298,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1312,7 +1312,7 @@ public java.lang.String getSecretType(); Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1326,7 +1326,7 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.python.md b/docs/gcpSecretRoleset.python.md index f184e3a8..7b2e59dc 100644 --- a/docs/gcpSecretRoleset.python.md +++ b/docs/gcpSecretRoleset.python.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -47,7 +47,7 @@ gcpSecretRoleset.GcpSecretRoleset( | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]] | binding block. | | project | str | Name of the GCP project that this roleset's service account will belong to. | | roleset | str | Name of the RoleSet to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- @@ -707,7 +707,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -1121,7 +1121,7 @@ resource: str Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -1135,7 +1135,7 @@ roles: typing.List[str] List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -1180,7 +1180,7 @@ gcpSecretRoleset.GcpSecretRolesetConfig( | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretRolesetBinding]] | binding block. | | project | str | Name of the GCP project that this roleset's service account will belong to. | | roleset | str | Name of the RoleSet to create. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1267,7 +1267,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1281,7 +1281,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretRolesetBinding]] binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1295,7 +1295,7 @@ project: str Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1309,7 +1309,7 @@ roleset: str Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1321,7 +1321,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1338,7 +1338,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1352,7 +1352,7 @@ secret_type: str Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1366,7 +1366,7 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretRoleset.typescript.md b/docs/gcpSecretRoleset.typescript.md index 27c490e0..9439e214 100644 --- a/docs/gcpSecretRoleset.typescript.md +++ b/docs/gcpSecretRoleset.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretRoleset -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset vault_gcp_secret_roleset}. #### Initializers @@ -508,7 +508,7 @@ The construct id used in the generated config for the GcpSecretRoleset to import The id of the existing GcpSecretRoleset that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#import import section} in the documentation of this resource for the id to use --- @@ -919,7 +919,7 @@ public readonly resource: string; Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#resource GcpSecretRoleset#resource} --- @@ -933,7 +933,7 @@ public readonly roles: string[]; List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roles GcpSecretRoleset#roles} --- @@ -962,7 +962,7 @@ const gcpSecretRolesetConfig: gcpSecretRoleset.GcpSecretRolesetConfig = { ... } | binding | cdktf.IResolvable \| GcpSecretRolesetBinding[] | binding block. | | project | string | Name of the GCP project that this roleset's service account will belong to. | | roleset | string | Name of the RoleSet to create. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretType | string | Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). | @@ -1049,7 +1049,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#backend GcpSecretRoleset#backend} --- @@ -1063,7 +1063,7 @@ public readonly binding: IResolvable | GcpSecretRolesetBinding[]; binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#binding GcpSecretRoleset#binding} --- @@ -1077,7 +1077,7 @@ public readonly project: string; Name of the GCP project that this roleset's service account will belong to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#project GcpSecretRoleset#project} --- @@ -1091,7 +1091,7 @@ public readonly roleset: string; Name of the RoleSet to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#roleset GcpSecretRoleset#roleset} --- @@ -1103,7 +1103,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#id GcpSecretRoleset#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1120,7 +1120,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#namespace GcpSecretRoleset#namespace} --- @@ -1134,7 +1134,7 @@ public readonly secretType: string; Type of secret generated for this role set. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#secret_type GcpSecretRoleset#secret_type} --- @@ -1148,7 +1148,7 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_roleset#token_scopes GcpSecretRoleset#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.csharp.md b/docs/gcpSecretStaticAccount.csharp.md index 4bee3fa3..8bc71504 100644 --- a/docs/gcpSecretStaticAccount.csharp.md +++ b/docs/gcpSecretStaticAccount.csharp.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -929,7 +929,7 @@ public string Resource { get; set; } Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -943,7 +943,7 @@ public string[] Roles { get; set; } List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -988,7 +988,7 @@ new GcpSecretStaticAccountConfig { | ServiceAccountEmail | string | Email of the GCP service account. | | StaticAccount | string | Name of the Static Account to create. | | Binding | object | binding block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | SecretType | string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1075,7 +1075,7 @@ public string Backend { get; set; } Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1089,7 +1089,7 @@ public string ServiceAccountEmail { get; set; } Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1103,7 +1103,7 @@ public string StaticAccount { get; set; } Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1117,7 +1117,7 @@ public object Binding { get; set; } binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1129,7 +1129,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1146,7 +1146,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1160,7 +1160,7 @@ public string SecretType { get; set; } Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1174,7 +1174,7 @@ public string[] TokenScopes { get; set; } List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.go.md b/docs/gcpSecretStaticAccount.go.md index 5a96d92a..92544efc 100644 --- a/docs/gcpSecretStaticAccount.go.md +++ b/docs/gcpSecretStaticAccount.go.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -929,7 +929,7 @@ Resource *string Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -943,7 +943,7 @@ Roles *[]*string List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -988,7 +988,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/gcpsecretstaticaccoun | ServiceAccountEmail | *string | Email of the GCP service account. | | StaticAccount | *string | Name of the Static Account to create. | | Binding | interface{} | binding block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | SecretType | *string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | TokenScopes | *[]*string | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1075,7 +1075,7 @@ Backend *string Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1089,7 +1089,7 @@ ServiceAccountEmail *string Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1103,7 +1103,7 @@ StaticAccount *string Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1117,7 +1117,7 @@ Binding interface{} binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1129,7 +1129,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1146,7 +1146,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1160,7 +1160,7 @@ SecretType *string Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1174,7 +1174,7 @@ TokenScopes *[]*string List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.java.md b/docs/gcpSecretStaticAccount.java.md index 4e9af41a..49d9f389 100644 --- a/docs/gcpSecretStaticAccount.java.md +++ b/docs/gcpSecretStaticAccount.java.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -50,7 +50,7 @@ GcpSecretStaticAccount.Builder.create(Construct scope, java.lang.String id) | serviceAccountEmail | java.lang.String | Email of the GCP service account. | | staticAccount | java.lang.String | Name of the Static Account to create. | | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding> | binding block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- @@ -669,7 +669,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -1083,7 +1083,7 @@ public java.lang.String getResource(); Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -1097,7 +1097,7 @@ public java.util.List getRoles(); List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -1147,7 +1147,7 @@ GcpSecretStaticAccountConfig.builder() | serviceAccountEmail | java.lang.String | Email of the GCP service account. | | staticAccount | java.lang.String | Name of the Static Account to create. | | binding | com.hashicorp.cdktf.IResolvable OR java.util.List<GcpSecretStaticAccountBinding> | binding block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | secretType | java.lang.String | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | java.util.List | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1234,7 +1234,7 @@ public java.lang.String getBackend(); Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1248,7 +1248,7 @@ public java.lang.String getServiceAccountEmail(); Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1262,7 +1262,7 @@ public java.lang.String getStaticAccount(); Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1276,7 +1276,7 @@ public java.lang.Object getBinding(); binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1288,7 +1288,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1305,7 +1305,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1319,7 +1319,7 @@ public java.lang.String getSecretType(); Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1333,7 +1333,7 @@ public java.util.List getTokenScopes(); List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.python.md b/docs/gcpSecretStaticAccount.python.md index a3317479..a993d782 100644 --- a/docs/gcpSecretStaticAccount.python.md +++ b/docs/gcpSecretStaticAccount.python.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -47,7 +47,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccount( | service_account_email | str | Email of the GCP service account. | | static_account | str | Name of the Static Account to create. | | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]] | binding block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- @@ -714,7 +714,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -1128,7 +1128,7 @@ resource: str Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -1142,7 +1142,7 @@ roles: typing.List[str] List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -1187,7 +1187,7 @@ gcpSecretStaticAccount.GcpSecretStaticAccountConfig( | service_account_email | str | Email of the GCP service account. | | static_account | str | Name of the Static Account to create. | | binding | typing.Union[cdktf.IResolvable, typing.List[GcpSecretStaticAccountBinding]] | binding block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | str | Target namespace. (requires Enterprise). | | secret_type | str | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | token_scopes | typing.List[str] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1274,7 +1274,7 @@ backend: str Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1288,7 +1288,7 @@ service_account_email: str Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1302,7 +1302,7 @@ static_account: str Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1316,7 +1316,7 @@ binding: typing.Union[IResolvable, typing.List[GcpSecretStaticAccountBinding]] binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1328,7 +1328,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1345,7 +1345,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1359,7 +1359,7 @@ secret_type: str Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1373,7 +1373,7 @@ token_scopes: typing.List[str] List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/gcpSecretStaticAccount.typescript.md b/docs/gcpSecretStaticAccount.typescript.md index caad5756..5c143739 100644 --- a/docs/gcpSecretStaticAccount.typescript.md +++ b/docs/gcpSecretStaticAccount.typescript.md @@ -4,7 +4,7 @@ ### GcpSecretStaticAccount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account vault_gcp_secret_static_account}. #### Initializers @@ -515,7 +515,7 @@ The construct id used in the generated config for the GcpSecretStaticAccount to The id of the existing GcpSecretStaticAccount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#import import section} in the documentation of this resource for the id to use --- @@ -926,7 +926,7 @@ public readonly resource: string; Resource name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#resource GcpSecretStaticAccount#resource} --- @@ -940,7 +940,7 @@ public readonly roles: string[]; List of roles to apply to the resource. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#roles GcpSecretStaticAccount#roles} --- @@ -969,7 +969,7 @@ const gcpSecretStaticAccountConfig: gcpSecretStaticAccount.GcpSecretStaticAccoun | serviceAccountEmail | string | Email of the GCP service account. | | staticAccount | string | Name of the Static Account to create. | | binding | cdktf.IResolvable \| GcpSecretStaticAccountBinding[] | binding block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. | | namespace | string | Target namespace. (requires Enterprise). | | secretType | string | Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. | | tokenScopes | string[] | List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). | @@ -1056,7 +1056,7 @@ public readonly backend: string; Path where the GCP secrets engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#backend GcpSecretStaticAccount#backend} --- @@ -1070,7 +1070,7 @@ public readonly serviceAccountEmail: string; Email of the GCP service account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#service_account_email GcpSecretStaticAccount#service_account_email} --- @@ -1084,7 +1084,7 @@ public readonly staticAccount: string; Name of the Static Account to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#static_account GcpSecretStaticAccount#static_account} --- @@ -1098,7 +1098,7 @@ public readonly binding: IResolvable | GcpSecretStaticAccountBinding[]; binding block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#binding GcpSecretStaticAccount#binding} --- @@ -1110,7 +1110,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#id GcpSecretStaticAccount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1127,7 +1127,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#namespace GcpSecretStaticAccount#namespace} --- @@ -1141,7 +1141,7 @@ public readonly secretType: string; Type of secret generated for this static account. Defaults to `access_token`. Accepted values: `access_token`, `service_account_key`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#secret_type GcpSecretStaticAccount#secret_type} --- @@ -1155,7 +1155,7 @@ public readonly tokenScopes: string[]; List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/gcp_secret_static_account#token_scopes GcpSecretStaticAccount#token_scopes} --- diff --git a/docs/genericEndpoint.csharp.md b/docs/genericEndpoint.csharp.md index 806df96b..3438f60e 100644 --- a/docs/genericEndpoint.csharp.md +++ b/docs/genericEndpoint.csharp.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ new GenericEndpointConfig { | Path | string | Full path where to the endpoint that will be written. | | DisableDelete | object | Don't attempt to delete the path from Vault if true. | | DisableRead | object | Don't attempt to read the path from Vault if true; drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | IgnoreAbsentFields | object | When reading, disregard fields not present in data_json. | | Namespace | string | Target namespace. (requires Enterprise). | | WriteFields | string[] | Top-level fields returned by write to persist in state. | @@ -1030,7 +1030,7 @@ public string DataJson { get; set; } JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1044,7 +1044,7 @@ public string Path { get; set; } Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1058,7 +1058,7 @@ public object DisableDelete { get; set; } Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1072,7 +1072,7 @@ public object DisableRead { get; set; } Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1084,7 +1084,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ public object IgnoreAbsentFields { get; set; } When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1115,7 +1115,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1129,7 +1129,7 @@ public string[] WriteFields { get; set; } Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.go.md b/docs/genericEndpoint.go.md index 3c7db094..37982c59 100644 --- a/docs/genericEndpoint.go.md +++ b/docs/genericEndpoint.go.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -943,7 +943,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericendpoint" | Path | *string | Full path where to the endpoint that will be written. | | DisableDelete | interface{} | Don't attempt to delete the path from Vault if true. | | DisableRead | interface{} | Don't attempt to read the path from Vault if true; drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | IgnoreAbsentFields | interface{} | When reading, disregard fields not present in data_json. | | Namespace | *string | Target namespace. (requires Enterprise). | | WriteFields | *[]*string | Top-level fields returned by write to persist in state. | @@ -1030,7 +1030,7 @@ DataJson *string JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1044,7 +1044,7 @@ Path *string Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1058,7 +1058,7 @@ DisableDelete interface{} Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1072,7 +1072,7 @@ DisableRead interface{} Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1084,7 +1084,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1101,7 +1101,7 @@ IgnoreAbsentFields interface{} When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1115,7 +1115,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1129,7 +1129,7 @@ WriteFields *[]*string Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.java.md b/docs/genericEndpoint.java.md index e5e82db9..4053a179 100644 --- a/docs/genericEndpoint.java.md +++ b/docs/genericEndpoint.java.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -52,7 +52,7 @@ GenericEndpoint.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Full path where to the endpoint that will be written. | | disableDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | writeFields | java.util.List | Top-level fields returned by write to persist in state. | @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -176,7 +176,7 @@ If you experience problems setting this value it might not be settable. Please t When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- @@ -665,7 +665,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -1106,7 +1106,7 @@ GenericEndpointConfig.builder() | path | java.lang.String | Full path where to the endpoint that will be written. | | disableDelete | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | writeFields | java.util.List | Top-level fields returned by write to persist in state. | @@ -1193,7 +1193,7 @@ public java.lang.String getDataJson(); JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1207,7 +1207,7 @@ public java.lang.String getPath(); Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1221,7 +1221,7 @@ public java.lang.Object getDisableDelete(); Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1235,7 +1235,7 @@ public java.lang.Object getDisableRead(); Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1247,7 +1247,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1264,7 +1264,7 @@ public java.lang.Object getIgnoreAbsentFields(); When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1278,7 +1278,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1292,7 +1292,7 @@ public java.util.List getWriteFields(); Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.python.md b/docs/genericEndpoint.python.md index f3772dfe..a5c2f806 100644 --- a/docs/genericEndpoint.python.md +++ b/docs/genericEndpoint.python.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -47,7 +47,7 @@ genericEndpoint.GenericEndpoint( | path | str | Full path where to the endpoint that will be written. | | disable_delete | typing.Union[bool, cdktf.IResolvable] | Don't attempt to delete the path from Vault if true. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignore_absent_fields | typing.Union[bool, cdktf.IResolvable] | When reading, disregard fields not present in data_json. | | namespace | str | Target namespace. (requires Enterprise). | | write_fields | typing.List[str] | Top-level fields returned by write to persist in state. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -1140,7 +1140,7 @@ genericEndpoint.GenericEndpointConfig( | path | str | Full path where to the endpoint that will be written. | | disable_delete | typing.Union[bool, cdktf.IResolvable] | Don't attempt to delete the path from Vault if true. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignore_absent_fields | typing.Union[bool, cdktf.IResolvable] | When reading, disregard fields not present in data_json. | | namespace | str | Target namespace. (requires Enterprise). | | write_fields | typing.List[str] | Top-level fields returned by write to persist in state. | @@ -1227,7 +1227,7 @@ data_json: str JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1241,7 +1241,7 @@ path: str Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1255,7 +1255,7 @@ disable_delete: typing.Union[bool, IResolvable] Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1269,7 +1269,7 @@ disable_read: typing.Union[bool, IResolvable] Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1281,7 +1281,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1298,7 +1298,7 @@ ignore_absent_fields: typing.Union[bool, IResolvable] When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1312,7 +1312,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1326,7 +1326,7 @@ write_fields: typing.List[str] Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericEndpoint.typescript.md b/docs/genericEndpoint.typescript.md index 090fefa0..ccc0c376 100644 --- a/docs/genericEndpoint.typescript.md +++ b/docs/genericEndpoint.typescript.md @@ -4,7 +4,7 @@ ### GenericEndpoint -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint vault_generic_endpoint}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint vault_generic_endpoint}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the GenericEndpoint to import. The id of the existing GenericEndpoint that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#import import section} in the documentation of this resource for the id to use --- @@ -927,7 +927,7 @@ const genericEndpointConfig: genericEndpoint.GenericEndpointConfig = { ... } | path | string | Full path where to the endpoint that will be written. | | disableDelete | boolean \| cdktf.IResolvable | Don't attempt to delete the path from Vault if true. | | disableRead | boolean \| cdktf.IResolvable | Don't attempt to read the path from Vault if true; drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. | | ignoreAbsentFields | boolean \| cdktf.IResolvable | When reading, disregard fields not present in data_json. | | namespace | string | Target namespace. (requires Enterprise). | | writeFields | string[] | Top-level fields returned by write to persist in state. | @@ -1014,7 +1014,7 @@ public readonly dataJson: string; JSON-encoded data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#data_json GenericEndpoint#data_json} --- @@ -1028,7 +1028,7 @@ public readonly path: string; Full path where to the endpoint that will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#path GenericEndpoint#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#path GenericEndpoint#path} --- @@ -1042,7 +1042,7 @@ public readonly disableDelete: boolean | IResolvable; Don't attempt to delete the path from Vault if true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_delete GenericEndpoint#disable_delete} --- @@ -1056,7 +1056,7 @@ public readonly disableRead: boolean | IResolvable; Don't attempt to read the path from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#disable_read GenericEndpoint#disable_read} --- @@ -1068,7 +1068,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#id GenericEndpoint#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1085,7 +1085,7 @@ public readonly ignoreAbsentFields: boolean | IResolvable; When reading, disregard fields not present in data_json. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#ignore_absent_fields GenericEndpoint#ignore_absent_fields} --- @@ -1099,7 +1099,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#namespace GenericEndpoint#namespace} --- @@ -1113,7 +1113,7 @@ public readonly writeFields: string[]; Top-level fields returned by write to persist in state. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_endpoint#write_fields GenericEndpoint#write_fields} --- diff --git a/docs/genericSecret.csharp.md b/docs/genericSecret.csharp.md index d1bc4ad0..65b6b173 100644 --- a/docs/genericSecret.csharp.md +++ b/docs/genericSecret.csharp.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ new GenericSecretConfig { | Path | string | Full path where the generic secret will be written. | | DeleteAllVersions | object | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | DisableRead | object | Don't attempt to read the token from Vault if true; drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -971,7 +971,7 @@ public string Path { get; set; } Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -985,7 +985,7 @@ public object DeleteAllVersions { get; set; } Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -999,7 +999,7 @@ public object DisableRead { get; set; } Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1011,7 +1011,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.go.md b/docs/genericSecret.go.md index 371e3d85..df02ba0b 100644 --- a/docs/genericSecret.go.md +++ b/docs/genericSecret.go.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -872,7 +872,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/genericsecret" | Path | *string | Full path where the generic secret will be written. | | DeleteAllVersions | interface{} | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | DisableRead | interface{} | Don't attempt to read the token from Vault if true; drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -957,7 +957,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -971,7 +971,7 @@ Path *string Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -985,7 +985,7 @@ DeleteAllVersions interface{} Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -999,7 +999,7 @@ DisableRead interface{} Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1011,7 +1011,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.java.md b/docs/genericSecret.java.md index f0410832..6106b0c8 100644 --- a/docs/genericSecret.java.md +++ b/docs/genericSecret.java.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -49,7 +49,7 @@ GenericSecret.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Full path where the generic secret will be written. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- @@ -626,7 +626,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -1009,7 +1009,7 @@ GenericSecretConfig.builder() | path | java.lang.String | Full path where the generic secret will be written. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1094,7 +1094,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -1108,7 +1108,7 @@ public java.lang.String getPath(); Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -1122,7 +1122,7 @@ public java.lang.Object getDeleteAllVersions(); Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -1136,7 +1136,7 @@ public java.lang.Object getDisableRead(); Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1148,7 +1148,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1165,7 +1165,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.python.md b/docs/genericSecret.python.md index c0fdbe8c..6ee0b661 100644 --- a/docs/genericSecret.python.md +++ b/docs/genericSecret.python.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -45,7 +45,7 @@ genericSecret.GenericSecret( | path | str | Full path where the generic secret will be written. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -1045,7 +1045,7 @@ genericSecret.GenericSecretConfig( | path | str | Full path where the generic secret will be written. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1130,7 +1130,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -1144,7 +1144,7 @@ path: str Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -1158,7 +1158,7 @@ delete_all_versions: typing.Union[bool, IResolvable] Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -1172,7 +1172,7 @@ disable_read: typing.Union[bool, IResolvable] Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -1184,7 +1184,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1201,7 +1201,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/genericSecret.typescript.md b/docs/genericSecret.typescript.md index 52c3bf42..30bf5966 100644 --- a/docs/genericSecret.typescript.md +++ b/docs/genericSecret.typescript.md @@ -4,7 +4,7 @@ ### GenericSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret vault_generic_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret vault_generic_secret}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GenericSecret to import. The id of the existing GenericSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#import import section} in the documentation of this resource for the id to use --- @@ -858,7 +858,7 @@ const genericSecretConfig: genericSecret.GenericSecretConfig = { ... } | path | string | Full path where the generic secret will be written. | | deleteAllVersions | boolean \| cdktf.IResolvable | Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. | | disableRead | boolean \| cdktf.IResolvable | Don't attempt to read the token from Vault if true; drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -943,7 +943,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#data_json GenericSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#data_json GenericSecret#data_json} --- @@ -957,7 +957,7 @@ public readonly path: string; Full path where the generic secret will be written. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#path GenericSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#path GenericSecret#path} --- @@ -971,7 +971,7 @@ public readonly deleteAllVersions: boolean | IResolvable; Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#delete_all_versions GenericSecret#delete_all_versions} --- @@ -985,7 +985,7 @@ public readonly disableRead: boolean | IResolvable; Don't attempt to read the token from Vault if true; drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#disable_read GenericSecret#disable_read} --- @@ -997,7 +997,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#id GenericSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#id GenericSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1014,7 +1014,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/generic_secret#namespace GenericSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/generic_secret#namespace GenericSecret#namespace} --- diff --git a/docs/githubAuthBackend.csharp.md b/docs/githubAuthBackend.csharp.md index 257247d9..e15e3cfb 100644 --- a/docs/githubAuthBackend.csharp.md +++ b/docs/githubAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1252,7 +1252,7 @@ new GithubAuthBackendConfig { | BaseUrl | string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | Description | string | Specifies the description of the mount. This overrides the current stored value, if any. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OrganizationId | double | The ID of the organization users must be part of. | | Path | string | Path where the auth backend is mounted. | @@ -1265,7 +1265,7 @@ new GithubAuthBackendConfig { | TokenPolicies | string[] | Generated Token's Policies. | | TokenTtl | double | The initial ttl of the token to generate in seconds. | | TokenType | string | The type of token to generate, service or batch. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1349,7 +1349,7 @@ public string Organization { get; set; } The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1363,7 +1363,7 @@ public string BaseUrl { get; set; } The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1377,7 +1377,7 @@ public string Description { get; set; } Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1391,7 +1391,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1403,7 +1403,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1420,7 +1420,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1436,7 +1436,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1450,7 +1450,7 @@ public string Path { get; set; } Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1464,7 +1464,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1478,7 +1478,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1492,7 +1492,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1506,7 +1506,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1520,7 +1520,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1534,7 +1534,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1548,7 +1548,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1562,7 +1562,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1576,7 +1576,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1588,7 +1588,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1615,14 +1615,14 @@ new GithubAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1634,7 +1634,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1646,7 +1646,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1658,7 +1658,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1670,7 +1670,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1682,7 +1682,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1694,7 +1694,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1706,7 +1706,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1718,7 +1718,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.go.md b/docs/githubAuthBackend.go.md index a8180cc1..fd8725e1 100644 --- a/docs/githubAuthBackend.go.md +++ b/docs/githubAuthBackend.go.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1252,7 +1252,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" | BaseUrl | *string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | Description | *string | Specifies the description of the mount. This overrides the current stored value, if any. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OrganizationId | *f64 | The ID of the organization users must be part of. | | Path | *string | Path where the auth backend is mounted. | @@ -1265,7 +1265,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" | TokenPolicies | *[]*string | Generated Token's Policies. | | TokenTtl | *f64 | The initial ttl of the token to generate in seconds. | | TokenType | *string | The type of token to generate, service or batch. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1349,7 +1349,7 @@ Organization *string The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1363,7 +1363,7 @@ BaseUrl *string The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1377,7 +1377,7 @@ Description *string Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1391,7 +1391,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1403,7 +1403,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1420,7 +1420,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1436,7 +1436,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1450,7 +1450,7 @@ Path *string Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1464,7 +1464,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1478,7 +1478,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1492,7 +1492,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1506,7 +1506,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1520,7 +1520,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1534,7 +1534,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1548,7 +1548,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1562,7 +1562,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1576,7 +1576,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1588,7 +1588,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1615,14 +1615,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1634,7 +1634,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1646,7 +1646,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1658,7 +1658,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1670,7 +1670,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1682,7 +1682,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1694,7 +1694,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1706,7 +1706,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1718,7 +1718,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.java.md b/docs/githubAuthBackend.java.md index a213a6a8..0aaeb4d9 100644 --- a/docs/githubAuthBackend.java.md +++ b/docs/githubAuthBackend.java.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -62,7 +62,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id) | baseUrl | java.lang.String | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | java.lang.String | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organizationId | java.lang.Number | The ID of the organization users must be part of. | | path | java.lang.String | Path where the auth backend is mounted. | @@ -75,7 +75,7 @@ GithubAuthBackend.Builder.create(Construct scope, java.lang.String id) | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -196,7 +196,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -208,7 +208,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -228,7 +228,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -875,7 +875,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1535,7 +1535,7 @@ GithubAuthBackendConfig.builder() | baseUrl | java.lang.String | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | java.lang.String | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | organizationId | java.lang.Number | The ID of the organization users must be part of. | | path | java.lang.String | Path where the auth backend is mounted. | @@ -1548,7 +1548,7 @@ GithubAuthBackendConfig.builder() | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1632,7 +1632,7 @@ public java.lang.String getOrganization(); The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1646,7 +1646,7 @@ public java.lang.String getBaseUrl(); The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1660,7 +1660,7 @@ public java.lang.String getDescription(); Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1674,7 +1674,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1686,7 +1686,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1703,7 +1703,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1719,7 +1719,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1733,7 +1733,7 @@ public java.lang.String getPath(); Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1747,7 +1747,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1761,7 +1761,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1775,7 +1775,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1789,7 +1789,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1803,7 +1803,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1817,7 +1817,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1831,7 +1831,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1845,7 +1845,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1859,7 +1859,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1871,7 +1871,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<GithubAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1898,14 +1898,14 @@ GithubAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1917,7 +1917,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1929,7 +1929,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1941,7 +1941,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1953,7 +1953,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1965,7 +1965,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1977,7 +1977,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1989,7 +1989,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -2001,7 +2001,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.python.md b/docs/githubAuthBackend.python.md index 0e53c861..95fc7e89 100644 --- a/docs/githubAuthBackend.python.md +++ b/docs/githubAuthBackend.python.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -57,7 +57,7 @@ githubAuthBackend.GithubAuthBackend( | base_url | str | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | str | Specifies the description of the mount. This overrides the current stored value, if any. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | organization_id | typing.Union[int, float] | The ID of the organization users must be part of. | | path | str | Path where the auth backend is mounted. | @@ -70,7 +70,7 @@ githubAuthBackend.GithubAuthBackend( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -191,7 +191,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -203,7 +203,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -918,7 +918,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1571,7 +1571,7 @@ githubAuthBackend.GithubAuthBackendConfig( | base_url | str | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | str | Specifies the description of the mount. This overrides the current stored value, if any. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | | organization_id | typing.Union[int, float] | The ID of the organization users must be part of. | | path | str | Path where the auth backend is mounted. | @@ -1584,7 +1584,7 @@ githubAuthBackend.GithubAuthBackendConfig( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1668,7 +1668,7 @@ organization: str The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1682,7 +1682,7 @@ base_url: str The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1696,7 +1696,7 @@ description: str Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1710,7 +1710,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1722,7 +1722,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1739,7 +1739,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1755,7 +1755,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1769,7 +1769,7 @@ path: str Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1783,7 +1783,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1797,7 +1797,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1811,7 +1811,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1825,7 +1825,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1839,7 +1839,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1853,7 +1853,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1867,7 +1867,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1881,7 +1881,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1895,7 +1895,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1907,7 +1907,7 @@ tune: typing.Union[IResolvable, typing.List[GithubAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[GithubAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1934,14 +1934,14 @@ githubAuthBackend.GithubAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1953,7 +1953,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1965,7 +1965,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1977,7 +1977,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1989,7 +1989,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -2001,7 +2001,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -2013,7 +2013,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -2025,7 +2025,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -2037,7 +2037,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubAuthBackend.typescript.md b/docs/githubAuthBackend.typescript.md index 56db913d..122effa3 100644 --- a/docs/githubAuthBackend.typescript.md +++ b/docs/githubAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### GithubAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend vault_github_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend vault_github_auth_backend}. #### Initializers @@ -599,7 +599,7 @@ The construct id used in the generated config for the GithubAuthBackend to impor The id of the existing GithubAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1226,7 +1226,7 @@ const githubAuthBackendConfig: githubAuthBackend.GithubAuthBackendConfig = { ... | baseUrl | string | The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. | | description | string | Specifies the description of the mount. This overrides the current stored value, if any. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | | organizationId | number | The ID of the organization users must be part of. | | path | string | Path where the auth backend is mounted. | @@ -1239,7 +1239,7 @@ const githubAuthBackendConfig: githubAuthBackend.GithubAuthBackendConfig = { ... | tokenPolicies | string[] | Generated Token's Policies. | | tokenTtl | number | The initial ttl of the token to generate in seconds. | | tokenType | string | The type of token to generate, service or batch. | -| tune | cdktf.IResolvable \| GithubAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | +| tune | cdktf.IResolvable \| GithubAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. | --- @@ -1323,7 +1323,7 @@ public readonly organization: string; The organization users must be part of. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization GithubAuthBackend#organization} --- @@ -1337,7 +1337,7 @@ public readonly baseUrl: string; The API endpoint to use. Useful if you are running GitHub Enterprise or an API-compatible authentication server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#base_url GithubAuthBackend#base_url} --- @@ -1351,7 +1351,7 @@ public readonly description: string; Specifies the description of the mount. This overrides the current stored value, if any. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#description GithubAuthBackend#description} --- @@ -1365,7 +1365,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#disable_remount GithubAuthBackend#disable_remount} --- @@ -1377,7 +1377,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#id GithubAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#namespace GithubAuthBackend#namespace} --- @@ -1410,7 +1410,7 @@ The ID of the organization users must be part of. Vault will attempt to fetch and set this value if it is not provided (vault-1.10+) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#organization_id GithubAuthBackend#organization_id} --- @@ -1424,7 +1424,7 @@ public readonly path: string; Path where the auth backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#path GithubAuthBackend#path} --- @@ -1438,7 +1438,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_bound_cidrs GithubAuthBackend#token_bound_cidrs} --- @@ -1452,7 +1452,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_explicit_max_ttl GithubAuthBackend#token_explicit_max_ttl} --- @@ -1466,7 +1466,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_max_ttl GithubAuthBackend#token_max_ttl} --- @@ -1480,7 +1480,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_no_default_policy GithubAuthBackend#token_no_default_policy} --- @@ -1494,7 +1494,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_num_uses GithubAuthBackend#token_num_uses} --- @@ -1508,7 +1508,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_period GithubAuthBackend#token_period} --- @@ -1522,7 +1522,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_policies GithubAuthBackend#token_policies} --- @@ -1536,7 +1536,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_ttl GithubAuthBackend#token_ttl} --- @@ -1550,7 +1550,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type} --- @@ -1562,7 +1562,7 @@ public readonly tune: IResolvable | GithubAuthBackendTune[]; - *Type:* cdktf.IResolvable | GithubAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#tune GithubAuthBackend#tune}. --- @@ -1580,14 +1580,14 @@ const githubAuthBackendTune: githubAuthBackend.GithubAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. | --- @@ -1599,7 +1599,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#allowed_response_headers GithubAuthBackend#allowed_response_headers}. --- @@ -1611,7 +1611,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_request_keys GithubAuthBackend#audit_non_hmac_request_keys}. --- @@ -1623,7 +1623,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#audit_non_hmac_response_keys GithubAuthBackend#audit_non_hmac_response_keys}. --- @@ -1635,7 +1635,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#default_lease_ttl GithubAuthBackend#default_lease_ttl}. --- @@ -1647,7 +1647,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#listing_visibility GithubAuthBackend#listing_visibility}. --- @@ -1659,7 +1659,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#max_lease_ttl GithubAuthBackend#max_lease_ttl}. --- @@ -1671,7 +1671,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#passthrough_request_headers GithubAuthBackend#passthrough_request_headers}. --- @@ -1683,7 +1683,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_auth_backend#token_type GithubAuthBackend#token_type}. --- diff --git a/docs/githubTeam.csharp.md b/docs/githubTeam.csharp.md index e7e641c1..34c92c96 100644 --- a/docs/githubTeam.csharp.md +++ b/docs/githubTeam.csharp.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new GithubTeamConfig { | Provisioners | object[] | *No description.* | | Team | string | GitHub team name in "slugified" format. | | Backend | string | Auth backend to which team mapping will be configured. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to be assigned to this team. | @@ -922,7 +922,7 @@ public string Team { get; set; } GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -936,7 +936,7 @@ public string Backend { get; set; } Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -979,7 +979,7 @@ public string[] Policies { get; set; } Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.go.md b/docs/githubTeam.go.md index 183db7a0..d2b7a3a5 100644 --- a/docs/githubTeam.go.md +++ b/docs/githubTeam.go.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubteam" | Provisioners | *[]interface{} | *No description.* | | Team | *string | GitHub team name in "slugified" format. | | Backend | *string | Auth backend to which team mapping will be configured. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to be assigned to this team. | @@ -922,7 +922,7 @@ Team *string GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -936,7 +936,7 @@ Backend *string Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -979,7 +979,7 @@ Policies *[]*string Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.java.md b/docs/githubTeam.java.md index 736210df..b24e4fae 100644 --- a/docs/githubTeam.java.md +++ b/docs/githubTeam.java.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -44,7 +44,7 @@ GithubTeam.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | team | java.lang.String | GitHub team name in "slugified" format. | | backend | java.lang.String | Auth backend to which team mapping will be configured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this team. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ GithubTeamConfig.builder() | provisioners | java.util.List | *No description.* | | team | java.lang.String | GitHub team name in "slugified" format. | | backend | java.lang.String | Auth backend to which team mapping will be configured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this team. | @@ -1043,7 +1043,7 @@ public java.lang.String getTeam(); GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -1100,7 +1100,7 @@ public java.util.List getPolicies(); Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.python.md b/docs/githubTeam.python.md index e77faf1b..af0f8507 100644 --- a/docs/githubTeam.python.md +++ b/docs/githubTeam.python.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -42,7 +42,7 @@ githubTeam.GithubTeam( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | team | str | GitHub team name in "slugified" format. | | backend | str | Auth backend to which team mapping will be configured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this team. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ githubTeam.GithubTeamConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | team | str | GitHub team name in "slugified" format. | | backend | str | Auth backend to which team mapping will be configured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this team. | @@ -1083,7 +1083,7 @@ team: str GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -1097,7 +1097,7 @@ backend: str Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -1140,7 +1140,7 @@ policies: typing.List[str] Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubTeam.typescript.md b/docs/githubTeam.typescript.md index bc5ee022..db4ce10d 100644 --- a/docs/githubTeam.typescript.md +++ b/docs/githubTeam.typescript.md @@ -4,7 +4,7 @@ ### GithubTeam -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team vault_github_team}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team vault_github_team}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubTeam to import. The id of the existing GithubTeam that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const githubTeamConfig: githubTeam.GithubTeamConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | team | string | GitHub team name in "slugified" format. | | backend | string | Auth backend to which team mapping will be configured. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to be assigned to this team. | @@ -909,7 +909,7 @@ public readonly team: string; GitHub team name in "slugified" format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#team GithubTeam#team} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#team GithubTeam#team} --- @@ -923,7 +923,7 @@ public readonly backend: string; Auth backend to which team mapping will be configured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#backend GithubTeam#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#backend GithubTeam#backend} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#id GithubTeam#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#id GithubTeam#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#namespace GithubTeam#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#namespace GithubTeam#namespace} --- @@ -966,7 +966,7 @@ public readonly policies: string[]; Policies to be assigned to this team. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_team#policies GithubTeam#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_team#policies GithubTeam#policies} --- diff --git a/docs/githubUser.csharp.md b/docs/githubUser.csharp.md index 248fe78c..c2c76502 100644 --- a/docs/githubUser.csharp.md +++ b/docs/githubUser.csharp.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new GithubUserConfig { | Provisioners | object[] | *No description.* | | User | string | GitHub user name. | | Backend | string | Auth backend to which user mapping will be congigured. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to be assigned to this user. | @@ -922,7 +922,7 @@ public string User { get; set; } GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -936,7 +936,7 @@ public string Backend { get; set; } Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -979,7 +979,7 @@ public string[] Policies { get; set; } Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.go.md b/docs/githubUser.go.md index c4450f12..1a6979a6 100644 --- a/docs/githubUser.go.md +++ b/docs/githubUser.go.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/githubuser" | Provisioners | *[]interface{} | *No description.* | | User | *string | GitHub user name. | | Backend | *string | Auth backend to which user mapping will be congigured. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to be assigned to this user. | @@ -922,7 +922,7 @@ User *string GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -936,7 +936,7 @@ Backend *string Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -979,7 +979,7 @@ Policies *[]*string Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.java.md b/docs/githubUser.java.md index 0ff1230e..58ff0561 100644 --- a/docs/githubUser.java.md +++ b/docs/githubUser.java.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -44,7 +44,7 @@ GithubUser.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | user | java.lang.String | GitHub user name. | | backend | java.lang.String | Auth backend to which user mapping will be congigured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this user. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ GithubUserConfig.builder() | provisioners | java.util.List | *No description.* | | user | java.lang.String | GitHub user name. | | backend | java.lang.String | Auth backend to which user mapping will be congigured. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to be assigned to this user. | @@ -1043,7 +1043,7 @@ public java.lang.String getUser(); GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -1057,7 +1057,7 @@ public java.lang.String getBackend(); Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -1100,7 +1100,7 @@ public java.util.List getPolicies(); Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.python.md b/docs/githubUser.python.md index 016de80f..59abf941 100644 --- a/docs/githubUser.python.md +++ b/docs/githubUser.python.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -42,7 +42,7 @@ githubUser.GithubUser( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | user | str | GitHub user name. | | backend | str | Auth backend to which user mapping will be congigured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this user. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ githubUser.GithubUserConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | user | str | GitHub user name. | | backend | str | Auth backend to which user mapping will be congigured. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to be assigned to this user. | @@ -1083,7 +1083,7 @@ user: str GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -1097,7 +1097,7 @@ backend: str Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -1140,7 +1140,7 @@ policies: typing.List[str] Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/githubUser.typescript.md b/docs/githubUser.typescript.md index 6f6d68d0..98354bd5 100644 --- a/docs/githubUser.typescript.md +++ b/docs/githubUser.typescript.md @@ -4,7 +4,7 @@ ### GithubUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user vault_github_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user vault_github_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the GithubUser to import. The id of the existing GithubUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const githubUserConfig: githubUser.GithubUserConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | user | string | GitHub user name. | | backend | string | Auth backend to which user mapping will be congigured. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to be assigned to this user. | @@ -909,7 +909,7 @@ public readonly user: string; GitHub user name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#user GithubUser#user} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#user GithubUser#user} --- @@ -923,7 +923,7 @@ public readonly backend: string; Auth backend to which user mapping will be congigured. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#backend GithubUser#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#backend GithubUser#backend} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#id GithubUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#id GithubUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#namespace GithubUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#namespace GithubUser#namespace} --- @@ -966,7 +966,7 @@ public readonly policies: string[]; Policies to be assigned to this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/github_user#policies GithubUser#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/github_user#policies GithubUser#policies} --- diff --git a/docs/identityEntity.csharp.md b/docs/identityEntity.csharp.md index 707f2022..55bad687 100644 --- a/docs/identityEntity.csharp.md +++ b/docs/identityEntity.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -903,7 +903,7 @@ new IdentityEntityConfig { | Provisioners | object[] | *No description.* | | Disabled | object | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | ExternalPolicies | object | Manage policies externally through `vault_identity_entity_policies`. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | Metadata | System.Collections.Generic.IDictionary | Metadata to be associated with the entity. | | Name | string | Name of the entity. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -991,7 +991,7 @@ public object Disabled { get; set; } Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1005,7 +1005,7 @@ public object ExternalPolicies { get; set; } Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public System.Collections.Generic.IDictionary Metadata { get; se Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1048,7 +1048,7 @@ public string Name { get; set; } Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1062,7 +1062,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1076,7 +1076,7 @@ public string[] Policies { get; set; } Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.go.md b/docs/identityEntity.go.md index adbd337f..bc62f7b5 100644 --- a/docs/identityEntity.go.md +++ b/docs/identityEntity.go.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -903,7 +903,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentity" | Provisioners | *[]interface{} | *No description.* | | Disabled | interface{} | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | ExternalPolicies | interface{} | Manage policies externally through `vault_identity_entity_policies`. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | Metadata | *map[string]*string | Metadata to be associated with the entity. | | Name | *string | Name of the entity. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -991,7 +991,7 @@ Disabled interface{} Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1005,7 +1005,7 @@ ExternalPolicies interface{} Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Metadata *map[string]*string Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1048,7 +1048,7 @@ Name *string Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1062,7 +1062,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1076,7 +1076,7 @@ Policies *[]*string Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.java.md b/docs/identityEntity.java.md index 067c81fa..ff572e4c 100644 --- a/docs/identityEntity.java.md +++ b/docs/identityEntity.java.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -48,7 +48,7 @@ IdentityEntity.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | java.util.Map | Metadata to be associated with the entity. | | name | java.lang.String | Name of the entity. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -163,7 +163,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- @@ -659,7 +659,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1052,7 +1052,7 @@ IdentityEntityConfig.builder() | provisioners | java.util.List | *No description.* | | disabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | java.util.Map | Metadata to be associated with the entity. | | name | java.lang.String | Name of the entity. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1140,7 +1140,7 @@ public java.lang.Object getDisabled(); Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1154,7 +1154,7 @@ public java.lang.Object getExternalPolicies(); Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public java.util.Map getMetadata(); Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1197,7 +1197,7 @@ public java.lang.String getName(); Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1211,7 +1211,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1225,7 +1225,7 @@ public java.util.List getPolicies(); Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.python.md b/docs/identityEntity.python.md index 93872acc..0775ca9b 100644 --- a/docs/identityEntity.python.md +++ b/docs/identityEntity.python.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -44,7 +44,7 @@ identityEntity.IdentityEntity( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_entity_policies`. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the entity. | | name | str | Name of the entity. | | namespace | str | Target namespace. (requires Enterprise). | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -149,7 +149,7 @@ If you experience problems setting this value it might not be settable. Please t Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- @@ -701,7 +701,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -1088,7 +1088,7 @@ identityEntity.IdentityEntityConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | disabled | typing.Union[bool, cdktf.IResolvable] | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_entity_policies`. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | typing.Mapping[str] | Metadata to be associated with the entity. | | name | str | Name of the entity. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1176,7 +1176,7 @@ disabled: typing.Union[bool, IResolvable] Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -1190,7 +1190,7 @@ external_policies: typing.Union[bool, IResolvable] Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1202,7 +1202,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1219,7 +1219,7 @@ metadata: typing.Mapping[str] Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1233,7 +1233,7 @@ name: str Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1247,7 +1247,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1261,7 +1261,7 @@ policies: typing.List[str] Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntity.typescript.md b/docs/identityEntity.typescript.md index c55fdb3f..c0ef9d49 100644 --- a/docs/identityEntity.typescript.md +++ b/docs/identityEntity.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntity -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity vault_identity_entity}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity vault_identity_entity}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the IdentityEntity to import. The id of the existing IdentityEntity that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#import import section} in the documentation of this resource for the id to use --- @@ -888,7 +888,7 @@ const identityEntityConfig: identityEntity.IdentityEntityConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | disabled | boolean \| cdktf.IResolvable | Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. | | externalPolicies | boolean \| cdktf.IResolvable | Manage policies externally through `vault_identity_entity_policies`. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. | | metadata | {[ key: string ]: string} | Metadata to be associated with the entity. | | name | string | Name of the entity. | | namespace | string | Target namespace. (requires Enterprise). | @@ -976,7 +976,7 @@ public readonly disabled: boolean | IResolvable; Whether the entity is disabled. Disabled entities' associated tokens cannot be used, but are not revoked. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#disabled IdentityEntity#disabled} --- @@ -990,7 +990,7 @@ public readonly externalPolicies: boolean | IResolvable; Manage policies externally through `vault_identity_entity_policies`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#external_policies IdentityEntity#external_policies} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#id IdentityEntity#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#id IdentityEntity#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly metadata: {[ key: string ]: string}; Metadata to be associated with the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#metadata IdentityEntity#metadata} --- @@ -1033,7 +1033,7 @@ public readonly name: string; Name of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#name IdentityEntity#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#name IdentityEntity#name} --- @@ -1047,7 +1047,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#namespace IdentityEntity#namespace} --- @@ -1061,7 +1061,7 @@ public readonly policies: string[]; Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity#policies IdentityEntity#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity#policies IdentityEntity#policies} --- diff --git a/docs/identityEntityAlias.csharp.md b/docs/identityEntityAlias.csharp.md index 32de3c72..15420715 100644 --- a/docs/identityEntityAlias.csharp.md +++ b/docs/identityEntityAlias.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ new IdentityEntityAliasConfig { | MountAccessor | string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | Name | string | Name of the entity alias. | | CustomMetadata | System.Collections.Generic.IDictionary | Custom metadata to be associated with this alias. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ public string CanonicalId { get; set; } ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -953,7 +953,7 @@ public string MountAccessor { get; set; } Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -967,7 +967,7 @@ public string Name { get; set; } Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -981,7 +981,7 @@ public System.Collections.Generic.IDictionary CustomMetadata { g Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.go.md b/docs/identityEntityAlias.go.md index 820ccfa9..e9a22ec2 100644 --- a/docs/identityEntityAlias.go.md +++ b/docs/identityEntityAlias.go.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -854,7 +854,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentityalias" | MountAccessor | *string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | Name | *string | Name of the entity alias. | | CustomMetadata | *map[string]*string | Custom metadata to be associated with this alias. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -939,7 +939,7 @@ CanonicalId *string ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -953,7 +953,7 @@ MountAccessor *string Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -967,7 +967,7 @@ Name *string Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -981,7 +981,7 @@ CustomMetadata *map[string]*string Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.java.md b/docs/identityEntityAlias.java.md index 89a73ba7..cbbc4ba3 100644 --- a/docs/identityEntityAlias.java.md +++ b/docs/identityEntityAlias.java.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -47,7 +47,7 @@ IdentityEntityAlias.Builder.create(Construct scope, java.lang.String id) | mountAccessor | java.lang.String | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | java.lang.String | Name of the entity alias. | | customMetadata | java.util.Map | Custom metadata to be associated with this alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -169,7 +169,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- @@ -617,7 +617,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -987,7 +987,7 @@ IdentityEntityAliasConfig.builder() | mountAccessor | java.lang.String | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | java.lang.String | Name of the entity alias. | | customMetadata | java.util.Map | Custom metadata to be associated with this alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1072,7 +1072,7 @@ public java.lang.String getCanonicalId(); ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -1086,7 +1086,7 @@ public java.lang.String getMountAccessor(); Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -1100,7 +1100,7 @@ public java.lang.String getName(); Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -1114,7 +1114,7 @@ public java.util.Map getCustomMetadata(); Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -1126,7 +1126,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.python.md b/docs/identityEntityAlias.python.md index d09f94b8..713de185 100644 --- a/docs/identityEntityAlias.python.md +++ b/docs/identityEntityAlias.python.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -45,7 +45,7 @@ identityEntityAlias.IdentityEntityAlias( | mount_accessor | str | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | str | Name of the entity alias. | | custom_metadata | typing.Mapping[str] | Custom metadata to be associated with this alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -1027,7 +1027,7 @@ identityEntityAlias.IdentityEntityAliasConfig( | mount_accessor | str | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | str | Name of the entity alias. | | custom_metadata | typing.Mapping[str] | Custom metadata to be associated with this alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1112,7 +1112,7 @@ canonical_id: str ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -1126,7 +1126,7 @@ mount_accessor: str Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -1140,7 +1140,7 @@ name: str Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -1154,7 +1154,7 @@ custom_metadata: typing.Mapping[str] Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityAlias.typescript.md b/docs/identityEntityAlias.typescript.md index fdcb1422..2fa5c688 100644 --- a/docs/identityEntityAlias.typescript.md +++ b/docs/identityEntityAlias.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntityAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias vault_identity_entity_alias}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityAlias to imp The id of the existing IdentityEntityAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#import import section} in the documentation of this resource for the id to use --- @@ -840,7 +840,7 @@ const identityEntityAliasConfig: identityEntityAlias.IdentityEntityAliasConfig = | mountAccessor | string | Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. | | name | string | Name of the entity alias. | | customMetadata | {[ key: string ]: string} | Custom metadata to be associated with this alias. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -925,7 +925,7 @@ public readonly canonicalId: string; ID of the entity to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#canonical_id IdentityEntityAlias#canonical_id} --- @@ -939,7 +939,7 @@ public readonly mountAccessor: string; Mount accessor to which this alias belongs toMount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#mount_accessor IdentityEntityAlias#mount_accessor} --- @@ -953,7 +953,7 @@ public readonly name: string; Name of the entity alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#name IdentityEntityAlias#name} --- @@ -967,7 +967,7 @@ public readonly customMetadata: {[ key: string ]: string}; Custom metadata to be associated with this alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#custom_metadata IdentityEntityAlias#custom_metadata} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#id IdentityEntityAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_alias#namespace IdentityEntityAlias#namespace} --- diff --git a/docs/identityEntityPolicies.csharp.md b/docs/identityEntityPolicies.csharp.md index 3c037682..0b958fb1 100644 --- a/docs/identityEntityPolicies.csharp.md +++ b/docs/identityEntityPolicies.csharp.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ new IdentityEntityPoliciesConfig { | EntityId | string | ID of the entity. | | Policies | string[] | Policies to be tied to the entity. | | Exclusive | object | Should the resource manage policies exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ public string EntityId { get; set; } ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -940,7 +940,7 @@ public string[] Policies { get; set; } Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -954,7 +954,7 @@ public object Exclusive { get; set; } Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.go.md b/docs/identityEntityPolicies.go.md index ec851927..fdbc7740 100644 --- a/docs/identityEntityPolicies.go.md +++ b/docs/identityEntityPolicies.go.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityentitypolicie | EntityId | *string | ID of the entity. | | Policies | *[]*string | Policies to be tied to the entity. | | Exclusive | interface{} | Should the resource manage policies exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ EntityId *string ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -940,7 +940,7 @@ Policies *[]*string Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -954,7 +954,7 @@ Exclusive interface{} Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.java.md b/docs/identityEntityPolicies.java.md index e9b817ef..b0703a65 100644 --- a/docs/identityEntityPolicies.java.md +++ b/docs/identityEntityPolicies.java.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -46,7 +46,7 @@ IdentityEntityPolicies.Builder.create(Construct scope, java.lang.String id) | entityId | java.lang.String | ID of the entity. | | policies | java.util.List | Policies to be tied to the entity. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -964,7 +964,7 @@ IdentityEntityPoliciesConfig.builder() | entityId | java.lang.String | ID of the entity. | | policies | java.util.List | Policies to be tied to the entity. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1049,7 +1049,7 @@ public java.lang.String getEntityId(); ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -1063,7 +1063,7 @@ public java.util.List getPolicies(); Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -1077,7 +1077,7 @@ public java.lang.Object getExclusive(); Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -1089,7 +1089,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.python.md b/docs/identityEntityPolicies.python.md index e6634bb1..a2221a3c 100644 --- a/docs/identityEntityPolicies.python.md +++ b/docs/identityEntityPolicies.python.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -43,7 +43,7 @@ identityEntityPolicies.IdentityEntityPolicies( | entity_id | str | ID of the entity. | | policies | typing.List[str] | Policies to be tied to the entity. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ identityEntityPolicies.IdentityEntityPoliciesConfig( | entity_id | str | ID of the entity. | | policies | typing.List[str] | Policies to be tied to the entity. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1087,7 +1087,7 @@ entity_id: str ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -1101,7 +1101,7 @@ policies: typing.List[str] Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -1115,7 +1115,7 @@ exclusive: typing.Union[bool, IResolvable] Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -1127,7 +1127,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityEntityPolicies.typescript.md b/docs/identityEntityPolicies.typescript.md index 0f72fae8..433e2e04 100644 --- a/docs/identityEntityPolicies.typescript.md +++ b/docs/identityEntityPolicies.typescript.md @@ -4,7 +4,7 @@ ### IdentityEntityPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies vault_identity_entity_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityEntityPolicies to The id of the existing IdentityEntityPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#import import section} in the documentation of this resource for the id to use --- @@ -828,7 +828,7 @@ const identityEntityPoliciesConfig: identityEntityPolicies.IdentityEntityPolicie | entityId | string | ID of the entity. | | policies | string[] | Policies to be tied to the entity. | | exclusive | boolean \| cdktf.IResolvable | Should the resource manage policies exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -913,7 +913,7 @@ public readonly entityId: string; ID of the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#entity_id IdentityEntityPolicies#entity_id} --- @@ -927,7 +927,7 @@ public readonly policies: string[]; Policies to be tied to the entity. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#policies IdentityEntityPolicies#policies} --- @@ -941,7 +941,7 @@ public readonly exclusive: boolean | IResolvable; Should the resource manage policies exclusively. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#exclusive IdentityEntityPolicies#exclusive} --- @@ -953,7 +953,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#id IdentityEntityPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -970,7 +970,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_entity_policies#namespace IdentityEntityPolicies#namespace} --- diff --git a/docs/identityGroup.csharp.md b/docs/identityGroup.csharp.md index 24ea8095..4d930471 100644 --- a/docs/identityGroup.csharp.md +++ b/docs/identityGroup.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1024,7 +1024,7 @@ new IdentityGroupConfig { | ExternalMemberEntityIds | object | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | ExternalMemberGroupIds | object | Manage member groups externally through `vault_identity_group_member_group_ids`. | | ExternalPolicies | object | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | MemberEntityIds | string[] | Entity IDs to be assigned as group members. | | MemberGroupIds | string[] | Group IDs to be assigned as group members. | | Metadata | System.Collections.Generic.IDictionary | Metadata to be associated with the group. | @@ -1115,7 +1115,7 @@ public object ExternalMemberEntityIds { get; set; } Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1129,7 +1129,7 @@ public object ExternalMemberGroupIds { get; set; } Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1143,7 +1143,7 @@ public object ExternalPolicies { get; set; } Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1155,7 +1155,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ public string[] MemberEntityIds { get; set; } Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1186,7 +1186,7 @@ public string[] MemberGroupIds { get; set; } Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1200,7 +1200,7 @@ public System.Collections.Generic.IDictionary Metadata { get; se Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1214,7 +1214,7 @@ public string Name { get; set; } Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1228,7 +1228,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1242,7 +1242,7 @@ public string[] Policies { get; set; } Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1256,7 +1256,7 @@ public string Type { get; set; } Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.go.md b/docs/identityGroup.go.md index 130c0881..1f954afb 100644 --- a/docs/identityGroup.go.md +++ b/docs/identityGroup.go.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1024,7 +1024,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroup" | ExternalMemberEntityIds | interface{} | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | ExternalMemberGroupIds | interface{} | Manage member groups externally through `vault_identity_group_member_group_ids`. | | ExternalPolicies | interface{} | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | MemberEntityIds | *[]*string | Entity IDs to be assigned as group members. | | MemberGroupIds | *[]*string | Group IDs to be assigned as group members. | | Metadata | *map[string]*string | Metadata to be associated with the group. | @@ -1115,7 +1115,7 @@ ExternalMemberEntityIds interface{} Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1129,7 +1129,7 @@ ExternalMemberGroupIds interface{} Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1143,7 +1143,7 @@ ExternalPolicies interface{} Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1155,7 +1155,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1172,7 +1172,7 @@ MemberEntityIds *[]*string Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1186,7 +1186,7 @@ MemberGroupIds *[]*string Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1200,7 +1200,7 @@ Metadata *map[string]*string Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1214,7 +1214,7 @@ Name *string Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1228,7 +1228,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1242,7 +1242,7 @@ Policies *[]*string Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1256,7 +1256,7 @@ Type *string Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.java.md b/docs/identityGroup.java.md index bc4a221d..c130c812 100644 --- a/docs/identityGroup.java.md +++ b/docs/identityGroup.java.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -54,7 +54,7 @@ IdentityGroup.Builder.create(Construct scope, java.lang.String id) | externalMemberEntityIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | metadata | java.util.Map | Metadata to be associated with the group. | @@ -131,7 +131,7 @@ Must be unique amongst siblings in the same scope Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -172,7 +172,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- @@ -736,7 +736,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1223,7 +1223,7 @@ IdentityGroupConfig.builder() | externalMemberEntityIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | metadata | java.util.Map | Metadata to be associated with the group. | @@ -1314,7 +1314,7 @@ public java.lang.Object getExternalMemberEntityIds(); Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1328,7 +1328,7 @@ public java.lang.Object getExternalMemberGroupIds(); Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1342,7 +1342,7 @@ public java.lang.Object getExternalPolicies(); Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1354,7 +1354,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1371,7 +1371,7 @@ public java.util.List getMemberEntityIds(); Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1385,7 +1385,7 @@ public java.util.List getMemberGroupIds(); Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1399,7 +1399,7 @@ public java.util.Map getMetadata(); Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1413,7 +1413,7 @@ public java.lang.String getName(); Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1427,7 +1427,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1441,7 +1441,7 @@ public java.util.List getPolicies(); Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1455,7 +1455,7 @@ public java.lang.String getType(); Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.python.md b/docs/identityGroup.python.md index f75c99c9..b1adcb47 100644 --- a/docs/identityGroup.python.md +++ b/docs/identityGroup.python.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -49,7 +49,7 @@ identityGroup.IdentityGroup( | external_member_entity_ids | typing.Union[bool, cdktf.IResolvable] | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | external_member_group_ids | typing.Union[bool, cdktf.IResolvable] | Manage member groups externally through `vault_identity_group_member_group_ids`. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | metadata | typing.Mapping[str] | Metadata to be associated with the group. | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- @@ -777,7 +777,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1257,7 +1257,7 @@ identityGroup.IdentityGroupConfig( | external_member_entity_ids | typing.Union[bool, cdktf.IResolvable] | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | external_member_group_ids | typing.Union[bool, cdktf.IResolvable] | Manage member groups externally through `vault_identity_group_member_group_ids`. | | external_policies | typing.Union[bool, cdktf.IResolvable] | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | metadata | typing.Mapping[str] | Metadata to be associated with the group. | @@ -1348,7 +1348,7 @@ external_member_entity_ids: typing.Union[bool, IResolvable] Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1362,7 +1362,7 @@ external_member_group_ids: typing.Union[bool, IResolvable] Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1376,7 +1376,7 @@ external_policies: typing.Union[bool, IResolvable] Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1388,7 +1388,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1405,7 +1405,7 @@ member_entity_ids: typing.List[str] Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1419,7 +1419,7 @@ member_group_ids: typing.List[str] Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1433,7 +1433,7 @@ metadata: typing.Mapping[str] Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1447,7 +1447,7 @@ name: str Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1461,7 +1461,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1475,7 +1475,7 @@ policies: typing.List[str] Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1489,7 +1489,7 @@ type: str Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroup.typescript.md b/docs/identityGroup.typescript.md index c408d290..929acb1f 100644 --- a/docs/identityGroup.typescript.md +++ b/docs/identityGroup.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group vault_identity_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group vault_identity_group}. #### Initializers @@ -544,7 +544,7 @@ The construct id used in the generated config for the IdentityGroup to import. The id of the existing IdentityGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#import import section} in the documentation of this resource for the id to use --- @@ -1005,7 +1005,7 @@ const identityGroupConfig: identityGroup.IdentityGroupConfig = { ... } | externalMemberEntityIds | boolean \| cdktf.IResolvable | Manage member entities externally through `vault_identity_group_member_entity_ids`. | | externalMemberGroupIds | boolean \| cdktf.IResolvable | Manage member groups externally through `vault_identity_group_member_group_ids`. | | externalPolicies | boolean \| cdktf.IResolvable | Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. | | memberEntityIds | string[] | Entity IDs to be assigned as group members. | | memberGroupIds | string[] | Group IDs to be assigned as group members. | | metadata | {[ key: string ]: string} | Metadata to be associated with the group. | @@ -1096,7 +1096,7 @@ public readonly externalMemberEntityIds: boolean | IResolvable; Manage member entities externally through `vault_identity_group_member_entity_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_entity_ids IdentityGroup#external_member_entity_ids} --- @@ -1110,7 +1110,7 @@ public readonly externalMemberGroupIds: boolean | IResolvable; Manage member groups externally through `vault_identity_group_member_group_ids`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_member_group_ids IdentityGroup#external_member_group_ids} --- @@ -1124,7 +1124,7 @@ public readonly externalPolicies: boolean | IResolvable; Manage policies externally through `vault_identity_group_policies`, allows using group ID in assigned policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#external_policies IdentityGroup#external_policies} --- @@ -1136,7 +1136,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#id IdentityGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#id IdentityGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1153,7 +1153,7 @@ public readonly memberEntityIds: string[]; Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_entity_ids IdentityGroup#member_entity_ids} --- @@ -1167,7 +1167,7 @@ public readonly memberGroupIds: string[]; Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#member_group_ids IdentityGroup#member_group_ids} --- @@ -1181,7 +1181,7 @@ public readonly metadata: {[ key: string ]: string}; Metadata to be associated with the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#metadata IdentityGroup#metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#metadata IdentityGroup#metadata} --- @@ -1195,7 +1195,7 @@ public readonly name: string; Name of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#name IdentityGroup#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#name IdentityGroup#name} --- @@ -1209,7 +1209,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#namespace IdentityGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#namespace IdentityGroup#namespace} --- @@ -1223,7 +1223,7 @@ public readonly policies: string[]; Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#policies IdentityGroup#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#policies IdentityGroup#policies} --- @@ -1237,7 +1237,7 @@ public readonly type: string; Type of the group, internal or external. Defaults to internal. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group#type IdentityGroup#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group#type IdentityGroup#type} --- diff --git a/docs/identityGroupAlias.csharp.md b/docs/identityGroupAlias.csharp.md index cb83745c..91f78fbd 100644 --- a/docs/identityGroupAlias.csharp.md +++ b/docs/identityGroupAlias.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ new IdentityGroupAliasConfig { | CanonicalId | string | ID of the group to which this is an alias. | | MountAccessor | string | Mount accessor to which this alias belongs to. | | Name | string | Name of the group alias. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ public string CanonicalId { get; set; } ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -922,7 +922,7 @@ public string MountAccessor { get; set; } Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -936,7 +936,7 @@ public string Name { get; set; } Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.go.md b/docs/identityGroupAlias.go.md index 39d00422..69809dd3 100644 --- a/docs/identityGroupAlias.go.md +++ b/docs/identityGroupAlias.go.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupalias" | CanonicalId | *string | ID of the group to which this is an alias. | | MountAccessor | *string | Mount accessor to which this alias belongs to. | | Name | *string | Name of the group alias. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -908,7 +908,7 @@ CanonicalId *string ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -922,7 +922,7 @@ MountAccessor *string Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -936,7 +936,7 @@ Name *string Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.java.md b/docs/identityGroupAlias.java.md index 95493ca3..7d68e53d 100644 --- a/docs/identityGroupAlias.java.md +++ b/docs/identityGroupAlias.java.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupAlias.Builder.create(Construct scope, java.lang.String id) | canonicalId | java.lang.String | ID of the group to which this is an alias. | | mountAccessor | java.lang.String | Mount accessor to which this alias belongs to. | | name | java.lang.String | Name of the group alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- @@ -598,7 +598,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -944,7 +944,7 @@ IdentityGroupAliasConfig.builder() | canonicalId | java.lang.String | ID of the group to which this is an alias. | | mountAccessor | java.lang.String | Mount accessor to which this alias belongs to. | | name | java.lang.String | Name of the group alias. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1029,7 +1029,7 @@ public java.lang.String getCanonicalId(); ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -1043,7 +1043,7 @@ public java.lang.String getMountAccessor(); Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -1057,7 +1057,7 @@ public java.lang.String getName(); Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.python.md b/docs/identityGroupAlias.python.md index 5d44ead6..06432c26 100644 --- a/docs/identityGroupAlias.python.md +++ b/docs/identityGroupAlias.python.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -43,7 +43,7 @@ identityGroupAlias.IdentityGroupAlias( | canonical_id | str | ID of the group to which this is an alias. | | mount_accessor | str | Mount accessor to which this alias belongs to. | | name | str | Name of the group alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -984,7 +984,7 @@ identityGroupAlias.IdentityGroupAliasConfig( | canonical_id | str | ID of the group to which this is an alias. | | mount_accessor | str | Mount accessor to which this alias belongs to. | | name | str | Name of the group alias. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1069,7 +1069,7 @@ canonical_id: str ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -1083,7 +1083,7 @@ mount_accessor: str Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -1097,7 +1097,7 @@ name: str Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupAlias.typescript.md b/docs/identityGroupAlias.typescript.md index c3040488..d9908b17 100644 --- a/docs/identityGroupAlias.typescript.md +++ b/docs/identityGroupAlias.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupAlias -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias vault_identity_group_alias}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias vault_identity_group_alias}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityGroupAlias to impo The id of the existing IdentityGroupAlias that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ const identityGroupAliasConfig: identityGroupAlias.IdentityGroupAliasConfig = { | canonicalId | string | ID of the group to which this is an alias. | | mountAccessor | string | Mount accessor to which this alias belongs to. | | name | string | Name of the group alias. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ public readonly canonicalId: string; ID of the group to which this is an alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#canonical_id IdentityGroupAlias#canonical_id} --- @@ -909,7 +909,7 @@ public readonly mountAccessor: string; Mount accessor to which this alias belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#mount_accessor IdentityGroupAlias#mount_accessor} --- @@ -923,7 +923,7 @@ public readonly name: string; Name of the group alias. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#name IdentityGroupAlias#name} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#id IdentityGroupAlias#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_alias#namespace IdentityGroupAlias#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.csharp.md b/docs/identityGroupMemberEntityIds.csharp.md index 750281a0..c88bd357 100644 --- a/docs/identityGroupMemberEntityIds.csharp.md +++ b/docs/identityGroupMemberEntityIds.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new IdentityGroupMemberEntityIdsConfig { | Provisioners | object[] | *No description.* | | GroupId | string | ID of the group. | | Exclusive | object | If set to true, allows the resource to manage member entity ids exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | MemberEntityIds | string[] | Entity IDs to be assigned as group members. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -950,7 +950,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ public string[] MemberEntityIds { get; set; } Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -981,7 +981,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.go.md b/docs/identityGroupMemberEntityIds.go.md index d7ab2ac8..8735f112 100644 --- a/docs/identityGroupMemberEntityIds.go.md +++ b/docs/identityGroupMemberEntityIds.go.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmemberen | Provisioners | *[]interface{} | *No description.* | | GroupId | *string | ID of the group. | | Exclusive | interface{} | If set to true, allows the resource to manage member entity ids exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | MemberEntityIds | *[]*string | Entity IDs to be assigned as group members. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -950,7 +950,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ MemberEntityIds *[]*string Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -981,7 +981,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.java.md b/docs/identityGroupMemberEntityIds.java.md index 96b2687e..71c4c5c5 100644 --- a/docs/identityGroupMemberEntityIds.java.md +++ b/docs/identityGroupMemberEntityIds.java.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupMemberEntityIds.Builder.create(Construct scope, java.lang.String id | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -129,7 +129,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- @@ -615,7 +615,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -961,7 +961,7 @@ IdentityGroupMemberEntityIdsConfig.builder() | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | java.util.List | Entity IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1047,7 +1047,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -1063,7 +1063,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -1075,7 +1075,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1092,7 +1092,7 @@ public java.util.List getMemberEntityIds(); Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.python.md b/docs/identityGroupMemberEntityIds.python.md index a34820cc..1632c527 100644 --- a/docs/identityGroupMemberEntityIds.python.md +++ b/docs/identityGroupMemberEntityIds.python.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -42,7 +42,7 @@ identityGroupMemberEntityIds.IdentityGroupMemberEntityIds( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member entity ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -126,7 +126,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -999,7 +999,7 @@ identityGroupMemberEntityIds.IdentityGroupMemberEntityIdsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member entity ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | member_entity_ids | typing.List[str] | Entity IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1085,7 +1085,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -1101,7 +1101,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -1113,7 +1113,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1130,7 +1130,7 @@ member_entity_ids: typing.List[str] Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberEntityIds.typescript.md b/docs/identityGroupMemberEntityIds.typescript.md index 5855806e..77b8abed 100644 --- a/docs/identityGroupMemberEntityIds.typescript.md +++ b/docs/identityGroupMemberEntityIds.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberEntityIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids vault_identity_group_member_entity_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberEntityI The id of the existing IdentityGroupMemberEntityIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const identityGroupMemberEntityIdsConfig: identityGroupMemberEntityIds.IdentityG | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupId | string | ID of the group. | | exclusive | boolean \| cdktf.IResolvable | If set to true, allows the resource to manage member entity ids exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. | | memberEntityIds | string[] | Entity IDs to be assigned as group members. | | namespace | string | Target namespace. (requires Enterprise). | @@ -909,7 +909,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#group_id IdentityGroupMemberEntityIds#group_id} --- @@ -925,7 +925,7 @@ If set to true, allows the resource to manage member entity ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#exclusive IdentityGroupMemberEntityIds#exclusive} --- @@ -937,7 +937,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#id IdentityGroupMemberEntityIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -954,7 +954,7 @@ public readonly memberEntityIds: string[]; Entity IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#member_entity_ids IdentityGroupMemberEntityIds#member_entity_ids} --- @@ -968,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_entity_ids#namespace IdentityGroupMemberEntityIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.csharp.md b/docs/identityGroupMemberGroupIds.csharp.md index bba52878..9805b779 100644 --- a/docs/identityGroupMemberGroupIds.csharp.md +++ b/docs/identityGroupMemberGroupIds.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new IdentityGroupMemberGroupIdsConfig { | Provisioners | object[] | *No description.* | | GroupId | string | ID of the group. | | Exclusive | object | If set to true, allows the resource to manage member group ids exclusively. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | MemberGroupIds | string[] | Group IDs to be assigned as group members. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -950,7 +950,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ public string[] MemberGroupIds { get; set; } Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -981,7 +981,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.go.md b/docs/identityGroupMemberGroupIds.go.md index c1c9da42..fd898faa 100644 --- a/docs/identityGroupMemberGroupIds.go.md +++ b/docs/identityGroupMemberGroupIds.go.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygroupmembergr | Provisioners | *[]interface{} | *No description.* | | GroupId | *string | ID of the group. | | Exclusive | interface{} | If set to true, allows the resource to manage member group ids exclusively. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | MemberGroupIds | *[]*string | Group IDs to be assigned as group members. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -922,7 +922,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -938,7 +938,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -950,7 +950,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -967,7 +967,7 @@ MemberGroupIds *[]*string Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -981,7 +981,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.java.md b/docs/identityGroupMemberGroupIds.java.md index 8b1f8d64..b6e1bf70 100644 --- a/docs/identityGroupMemberGroupIds.java.md +++ b/docs/identityGroupMemberGroupIds.java.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -45,7 +45,7 @@ IdentityGroupMemberGroupIds.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -129,7 +129,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- @@ -615,7 +615,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -961,7 +961,7 @@ IdentityGroupMemberGroupIdsConfig.builder() | provisioners | java.util.List | *No description.* | | groupId | java.lang.String | ID of the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | java.util.List | Group IDs to be assigned as group members. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1047,7 +1047,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -1063,7 +1063,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -1075,7 +1075,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1092,7 +1092,7 @@ public java.util.List getMemberGroupIds(); Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.python.md b/docs/identityGroupMemberGroupIds.python.md index a6cc6e9f..61faa96d 100644 --- a/docs/identityGroupMemberGroupIds.python.md +++ b/docs/identityGroupMemberGroupIds.python.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -42,7 +42,7 @@ identityGroupMemberGroupIds.IdentityGroupMemberGroupIds( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member group ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -126,7 +126,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- @@ -658,7 +658,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -999,7 +999,7 @@ identityGroupMemberGroupIds.IdentityGroupMemberGroupIdsConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_id | str | ID of the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | If set to true, allows the resource to manage member group ids exclusively. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | member_group_ids | typing.List[str] | Group IDs to be assigned as group members. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1085,7 +1085,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -1101,7 +1101,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -1113,7 +1113,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1130,7 +1130,7 @@ member_group_ids: typing.List[str] Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupMemberGroupIds.typescript.md b/docs/identityGroupMemberGroupIds.typescript.md index 04f93b20..87be86de 100644 --- a/docs/identityGroupMemberGroupIds.typescript.md +++ b/docs/identityGroupMemberGroupIds.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupMemberGroupIds -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids vault_identity_group_member_group_ids}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityGroupMemberGroupId The id of the existing IdentityGroupMemberGroupIds that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const identityGroupMemberGroupIdsConfig: identityGroupMemberGroupIds.IdentityGro | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupId | string | ID of the group. | | exclusive | boolean \| cdktf.IResolvable | If set to true, allows the resource to manage member group ids exclusively. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. | | memberGroupIds | string[] | Group IDs to be assigned as group members. | | namespace | string | Target namespace. (requires Enterprise). | @@ -909,7 +909,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#group_id IdentityGroupMemberGroupIds#group_id} --- @@ -925,7 +925,7 @@ If set to true, allows the resource to manage member group ids exclusively. Beware of race conditions when disabling exclusive management -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#exclusive IdentityGroupMemberGroupIds#exclusive} --- @@ -937,7 +937,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#id IdentityGroupMemberGroupIds#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -954,7 +954,7 @@ public readonly memberGroupIds: string[]; Group IDs to be assigned as group members. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#member_group_ids IdentityGroupMemberGroupIds#member_group_ids} --- @@ -968,7 +968,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_member_group_ids#namespace IdentityGroupMemberGroupIds#namespace} --- diff --git a/docs/identityGroupPolicies.csharp.md b/docs/identityGroupPolicies.csharp.md index ebb19b76..edf72152 100644 --- a/docs/identityGroupPolicies.csharp.md +++ b/docs/identityGroupPolicies.csharp.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ new IdentityGroupPoliciesConfig { | GroupId | string | ID of the group. | | Policies | string[] | Policies to be tied to the group. | | Exclusive | object | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ public string GroupId { get; set; } ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -940,7 +940,7 @@ public string[] Policies { get; set; } Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -954,7 +954,7 @@ public object Exclusive { get; set; } Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -966,7 +966,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.go.md b/docs/identityGroupPolicies.go.md index 2a611659..9934c84f 100644 --- a/docs/identityGroupPolicies.go.md +++ b/docs/identityGroupPolicies.go.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -841,7 +841,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitygrouppolicies | GroupId | *string | ID of the group. | | Policies | *[]*string | Policies to be tied to the group. | | Exclusive | interface{} | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -926,7 +926,7 @@ GroupId *string ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -940,7 +940,7 @@ Policies *[]*string Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -954,7 +954,7 @@ Exclusive interface{} Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -966,7 +966,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.java.md b/docs/identityGroupPolicies.java.md index 946119db..28da1934 100644 --- a/docs/identityGroupPolicies.java.md +++ b/docs/identityGroupPolicies.java.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -46,7 +46,7 @@ IdentityGroupPolicies.Builder.create(Construct scope, java.lang.String id) | groupId | java.lang.String | ID of the group. | | policies | java.util.List | Policies to be tied to the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -964,7 +964,7 @@ IdentityGroupPoliciesConfig.builder() | groupId | java.lang.String | ID of the group. | | policies | java.util.List | Policies to be tied to the group. | | exclusive | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1049,7 +1049,7 @@ public java.lang.String getGroupId(); ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -1063,7 +1063,7 @@ public java.util.List getPolicies(); Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -1077,7 +1077,7 @@ public java.lang.Object getExclusive(); Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -1089,7 +1089,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1106,7 +1106,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.python.md b/docs/identityGroupPolicies.python.md index 196826d9..dc0d505f 100644 --- a/docs/identityGroupPolicies.python.md +++ b/docs/identityGroupPolicies.python.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -43,7 +43,7 @@ identityGroupPolicies.IdentityGroupPolicies( | group_id | str | ID of the group. | | policies | typing.List[str] | Policies to be tied to the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ identityGroupPolicies.IdentityGroupPoliciesConfig( | group_id | str | ID of the group. | | policies | typing.List[str] | Policies to be tied to the group. | | exclusive | typing.Union[bool, cdktf.IResolvable] | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1087,7 +1087,7 @@ group_id: str ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -1101,7 +1101,7 @@ policies: typing.List[str] Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -1115,7 +1115,7 @@ exclusive: typing.Union[bool, IResolvable] Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -1127,7 +1127,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1144,7 +1144,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityGroupPolicies.typescript.md b/docs/identityGroupPolicies.typescript.md index 37d97a8d..e85c766a 100644 --- a/docs/identityGroupPolicies.typescript.md +++ b/docs/identityGroupPolicies.typescript.md @@ -4,7 +4,7 @@ ### IdentityGroupPolicies -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies vault_identity_group_policies}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies vault_identity_group_policies}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityGroupPolicies to i The id of the existing IdentityGroupPolicies that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#import import section} in the documentation of this resource for the id to use --- @@ -828,7 +828,7 @@ const identityGroupPoliciesConfig: identityGroupPolicies.IdentityGroupPoliciesCo | groupId | string | ID of the group. | | policies | string[] | Policies to be tied to the group. | | exclusive | boolean \| cdktf.IResolvable | Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -913,7 +913,7 @@ public readonly groupId: string; ID of the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#group_id IdentityGroupPolicies#group_id} --- @@ -927,7 +927,7 @@ public readonly policies: string[]; Policies to be tied to the group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#policies IdentityGroupPolicies#policies} --- @@ -941,7 +941,7 @@ public readonly exclusive: boolean | IResolvable; Should the resource manage policies exclusively? Beware of race conditions when disabling exclusive management. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#exclusive IdentityGroupPolicies#exclusive} --- @@ -953,7 +953,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#id IdentityGroupPolicies#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -970,7 +970,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_group_policies#namespace IdentityGroupPolicies#namespace} --- diff --git a/docs/identityMfaDuo.csharp.md b/docs/identityMfaDuo.csharp.md index 09633a21..eb3a438c 100644 --- a/docs/identityMfaDuo.csharp.md +++ b/docs/identityMfaDuo.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ new IdentityMfaDuoConfig { | ApiHostname | string | API hostname for Duo. | | IntegrationKey | string | Integration key for Duo. | | SecretKey | string | Secret key for Duo. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PushInfo | string | Push information for Duo. | | UsePasscode | object | Require passcode upon MFA validation. | @@ -1078,7 +1078,7 @@ public string ApiHostname { get; set; } API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1092,7 +1092,7 @@ public string IntegrationKey { get; set; } Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1106,7 +1106,7 @@ public string SecretKey { get; set; } Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1118,7 +1118,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1149,7 +1149,7 @@ public string PushInfo { get; set; } Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1163,7 +1163,7 @@ public object UsePasscode { get; set; } Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1177,7 +1177,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.go.md b/docs/identityMfaDuo.go.md index 0c3fdbc1..9bcc88a5 100644 --- a/docs/identityMfaDuo.go.md +++ b/docs/identityMfaDuo.go.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaduo" | ApiHostname | *string | API hostname for Duo. | | IntegrationKey | *string | Integration key for Duo. | | SecretKey | *string | Secret key for Duo. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PushInfo | *string | Push information for Duo. | | UsePasscode | interface{} | Require passcode upon MFA validation. | @@ -1078,7 +1078,7 @@ ApiHostname *string API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1092,7 +1092,7 @@ IntegrationKey *string Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1106,7 +1106,7 @@ SecretKey *string Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1118,7 +1118,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1135,7 +1135,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1149,7 +1149,7 @@ PushInfo *string Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1163,7 +1163,7 @@ UsePasscode interface{} Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1177,7 +1177,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.java.md b/docs/identityMfaDuo.java.md index c1ae05ce..529f05bf 100644 --- a/docs/identityMfaDuo.java.md +++ b/docs/identityMfaDuo.java.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -49,7 +49,7 @@ IdentityMfaDuo.Builder.create(Construct scope, java.lang.String id) | apiHostname | java.lang.String | API hostname for Duo. | | integrationKey | java.lang.String | Integration key for Duo. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usePasscode | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Require passcode upon MFA validation. | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1149,7 +1149,7 @@ IdentityMfaDuoConfig.builder() | apiHostname | java.lang.String | API hostname for Duo. | | integrationKey | java.lang.String | Integration key for Duo. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usePasscode | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Require passcode upon MFA validation. | @@ -1237,7 +1237,7 @@ public java.lang.String getApiHostname(); API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1251,7 +1251,7 @@ public java.lang.String getIntegrationKey(); Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1265,7 +1265,7 @@ public java.lang.String getSecretKey(); Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1277,7 +1277,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1294,7 +1294,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1308,7 +1308,7 @@ public java.lang.String getPushInfo(); Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1322,7 +1322,7 @@ public java.lang.Object getUsePasscode(); Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1336,7 +1336,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.python.md b/docs/identityMfaDuo.python.md index 46b9ded7..17e0ac32 100644 --- a/docs/identityMfaDuo.python.md +++ b/docs/identityMfaDuo.python.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -46,7 +46,7 @@ identityMfaDuo.IdentityMfaDuo( | api_hostname | str | API hostname for Duo. | | integration_key | str | Integration key for Duo. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | use_passcode | typing.Union[bool, cdktf.IResolvable] | Require passcode upon MFA validation. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- @@ -699,7 +699,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1187,7 +1187,7 @@ identityMfaDuo.IdentityMfaDuoConfig( | api_hostname | str | API hostname for Duo. | | integration_key | str | Integration key for Duo. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | use_passcode | typing.Union[bool, cdktf.IResolvable] | Require passcode upon MFA validation. | @@ -1275,7 +1275,7 @@ api_hostname: str API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1289,7 +1289,7 @@ integration_key: str Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1303,7 +1303,7 @@ secret_key: str Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1315,7 +1315,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1332,7 +1332,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1346,7 +1346,7 @@ push_info: str Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1360,7 +1360,7 @@ use_passcode: typing.Union[bool, IResolvable] Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1374,7 +1374,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaDuo.typescript.md b/docs/identityMfaDuo.typescript.md index 960c85d6..9adeb910 100644 --- a/docs/identityMfaDuo.typescript.md +++ b/docs/identityMfaDuo.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo vault_identity_mfa_duo}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaDuo to import. The id of the existing IdentityMfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -974,7 +974,7 @@ const identityMfaDuoConfig: identityMfaDuo.IdentityMfaDuoConfig = { ... } | apiHostname | string | API hostname for Duo. | | integrationKey | string | Integration key for Duo. | | secretKey | string | Secret key for Duo. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pushInfo | string | Push information for Duo. | | usePasscode | boolean \| cdktf.IResolvable | Require passcode upon MFA validation. | @@ -1062,7 +1062,7 @@ public readonly apiHostname: string; API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#api_hostname IdentityMfaDuo#api_hostname} --- @@ -1076,7 +1076,7 @@ public readonly integrationKey: string; Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#integration_key IdentityMfaDuo#integration_key} --- @@ -1090,7 +1090,7 @@ public readonly secretKey: string; Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#secret_key IdentityMfaDuo#secret_key} --- @@ -1102,7 +1102,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#id IdentityMfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#namespace IdentityMfaDuo#namespace} --- @@ -1133,7 +1133,7 @@ public readonly pushInfo: string; Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#push_info IdentityMfaDuo#push_info} --- @@ -1147,7 +1147,7 @@ public readonly usePasscode: boolean | IResolvable; Require passcode upon MFA validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#use_passcode IdentityMfaDuo#use_passcode} --- @@ -1161,7 +1161,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_duo#username_format IdentityMfaDuo#username_format} --- diff --git a/docs/identityMfaLoginEnforcement.csharp.md b/docs/identityMfaLoginEnforcement.csharp.md index 97fbfdf2..9c1e4691 100644 --- a/docs/identityMfaLoginEnforcement.csharp.md +++ b/docs/identityMfaLoginEnforcement.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -954,7 +954,7 @@ new IdentityMfaLoginEnforcementConfig { | Name | string | Login enforcement name. | | AuthMethodAccessors | string[] | Set of auth method accessor IDs. | | AuthMethodTypes | string[] | Set of auth method types. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | IdentityEntityIds | string[] | Set of identity entity IDs. | | IdentityGroupIds | string[] | Set of identity group IDs. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1041,7 +1041,7 @@ public string[] MfaMethodIds { get; set; } Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1055,7 +1055,7 @@ public string Name { get; set; } Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1069,7 +1069,7 @@ public string[] AuthMethodAccessors { get; set; } Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1083,7 +1083,7 @@ public string[] AuthMethodTypes { get; set; } Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1095,7 +1095,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1112,7 +1112,7 @@ public string[] IdentityEntityIds { get; set; } Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1126,7 +1126,7 @@ public string[] IdentityGroupIds { get; set; } Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1140,7 +1140,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.go.md b/docs/identityMfaLoginEnforcement.go.md index b9c3f169..7b8dfd50 100644 --- a/docs/identityMfaLoginEnforcement.go.md +++ b/docs/identityMfaLoginEnforcement.go.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -954,7 +954,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaloginenfor | Name | *string | Login enforcement name. | | AuthMethodAccessors | *[]*string | Set of auth method accessor IDs. | | AuthMethodTypes | *[]*string | Set of auth method types. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | IdentityEntityIds | *[]*string | Set of identity entity IDs. | | IdentityGroupIds | *[]*string | Set of identity group IDs. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1041,7 +1041,7 @@ MfaMethodIds *[]*string Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1055,7 +1055,7 @@ Name *string Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1069,7 +1069,7 @@ AuthMethodAccessors *[]*string Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1083,7 +1083,7 @@ AuthMethodTypes *[]*string Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1095,7 +1095,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1112,7 +1112,7 @@ IdentityEntityIds *[]*string Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1126,7 +1126,7 @@ IdentityGroupIds *[]*string Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1140,7 +1140,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.java.md b/docs/identityMfaLoginEnforcement.java.md index 1a96df7d..93fb43df 100644 --- a/docs/identityMfaLoginEnforcement.java.md +++ b/docs/identityMfaLoginEnforcement.java.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -49,7 +49,7 @@ IdentityMfaLoginEnforcement.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Login enforcement name. | | authMethodAccessors | java.util.List | Set of auth method accessor IDs. | | authMethodTypes | java.util.List | Set of auth method types. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | java.util.List | Set of identity entity IDs. | | identityGroupIds | java.util.List | Set of identity group IDs. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -173,7 +173,7 @@ If you experience problems setting this value it might not be settable. Please t Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -1111,7 +1111,7 @@ IdentityMfaLoginEnforcementConfig.builder() | name | java.lang.String | Login enforcement name. | | authMethodAccessors | java.util.List | Set of auth method accessor IDs. | | authMethodTypes | java.util.List | Set of auth method types. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | java.util.List | Set of identity entity IDs. | | identityGroupIds | java.util.List | Set of identity group IDs. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1198,7 +1198,7 @@ public java.util.List getMfaMethodIds(); Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1212,7 +1212,7 @@ public java.lang.String getName(); Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1226,7 +1226,7 @@ public java.util.List getAuthMethodAccessors(); Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1240,7 +1240,7 @@ public java.util.List getAuthMethodTypes(); Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1252,7 +1252,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1269,7 +1269,7 @@ public java.util.List getIdentityEntityIds(); Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1283,7 +1283,7 @@ public java.util.List getIdentityGroupIds(); Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1297,7 +1297,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.python.md b/docs/identityMfaLoginEnforcement.python.md index 90b7d2fc..796e4014 100644 --- a/docs/identityMfaLoginEnforcement.python.md +++ b/docs/identityMfaLoginEnforcement.python.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -47,7 +47,7 @@ identityMfaLoginEnforcement.IdentityMfaLoginEnforcement( | name | str | Login enforcement name. | | auth_method_accessors | typing.List[str] | Set of auth method accessor IDs. | | auth_method_types | typing.List[str] | Set of auth method types. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identity_entity_ids | typing.List[str] | Set of identity entity IDs. | | identity_group_ids | typing.List[str] | Set of identity group IDs. | | namespace | str | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -1151,7 +1151,7 @@ identityMfaLoginEnforcement.IdentityMfaLoginEnforcementConfig( | name | str | Login enforcement name. | | auth_method_accessors | typing.List[str] | Set of auth method accessor IDs. | | auth_method_types | typing.List[str] | Set of auth method types. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identity_entity_ids | typing.List[str] | Set of identity entity IDs. | | identity_group_ids | typing.List[str] | Set of identity group IDs. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1238,7 +1238,7 @@ mfa_method_ids: typing.List[str] Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1252,7 +1252,7 @@ name: str Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1266,7 +1266,7 @@ auth_method_accessors: typing.List[str] Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1280,7 +1280,7 @@ auth_method_types: typing.List[str] Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1292,7 +1292,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1309,7 +1309,7 @@ identity_entity_ids: typing.List[str] Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1323,7 +1323,7 @@ identity_group_ids: typing.List[str] Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1337,7 +1337,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaLoginEnforcement.typescript.md b/docs/identityMfaLoginEnforcement.typescript.md index 04e1ff0c..5171f9e4 100644 --- a/docs/identityMfaLoginEnforcement.typescript.md +++ b/docs/identityMfaLoginEnforcement.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaLoginEnforcement -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement vault_identity_mfa_login_enforcement}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityMfaLoginEnforcemen The id of the existing IdentityMfaLoginEnforcement that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#import import section} in the documentation of this resource for the id to use --- @@ -938,7 +938,7 @@ const identityMfaLoginEnforcementConfig: identityMfaLoginEnforcement.IdentityMfa | name | string | Login enforcement name. | | authMethodAccessors | string[] | Set of auth method accessor IDs. | | authMethodTypes | string[] | Set of auth method types. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. | | identityEntityIds | string[] | Set of identity entity IDs. | | identityGroupIds | string[] | Set of identity group IDs. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1025,7 +1025,7 @@ public readonly mfaMethodIds: string[]; Set of MFA method UUIDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#mfa_method_ids IdentityMfaLoginEnforcement#mfa_method_ids} --- @@ -1039,7 +1039,7 @@ public readonly name: string; Login enforcement name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#name IdentityMfaLoginEnforcement#name} --- @@ -1053,7 +1053,7 @@ public readonly authMethodAccessors: string[]; Set of auth method accessor IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_accessors IdentityMfaLoginEnforcement#auth_method_accessors} --- @@ -1067,7 +1067,7 @@ public readonly authMethodTypes: string[]; Set of auth method types. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#auth_method_types IdentityMfaLoginEnforcement#auth_method_types} --- @@ -1079,7 +1079,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#id IdentityMfaLoginEnforcement#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ public readonly identityEntityIds: string[]; Set of identity entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_entity_ids IdentityMfaLoginEnforcement#identity_entity_ids} --- @@ -1110,7 +1110,7 @@ public readonly identityGroupIds: string[]; Set of identity group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#identity_group_ids IdentityMfaLoginEnforcement#identity_group_ids} --- @@ -1124,7 +1124,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_login_enforcement#namespace IdentityMfaLoginEnforcement#namespace} --- diff --git a/docs/identityMfaOkta.csharp.md b/docs/identityMfaOkta.csharp.md index fc267c4c..a64a62cd 100644 --- a/docs/identityMfaOkta.csharp.md +++ b/docs/identityMfaOkta.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -967,7 +967,7 @@ new IdentityMfaOktaConfig { | ApiToken | string | Okta API token. | | OrgName | string | Name of the organization to be used in the Okta API. | | BaseUrl | string | The base domain to use for API requests. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PrimaryEmail | object | Only match the primary email for the account. | | UsernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1054,7 +1054,7 @@ public string ApiToken { get; set; } Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1068,7 +1068,7 @@ public string OrgName { get; set; } Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1082,7 +1082,7 @@ public string BaseUrl { get; set; } The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1094,7 +1094,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1111,7 +1111,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1125,7 +1125,7 @@ public object PrimaryEmail { get; set; } Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1139,7 +1139,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.go.md b/docs/identityMfaOkta.go.md index e0490865..3d54b838 100644 --- a/docs/identityMfaOkta.go.md +++ b/docs/identityMfaOkta.go.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -967,7 +967,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfaokta" | ApiToken | *string | Okta API token. | | OrgName | *string | Name of the organization to be used in the Okta API. | | BaseUrl | *string | The base domain to use for API requests. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PrimaryEmail | interface{} | Only match the primary email for the account. | | UsernameFormat | *string | A template string for mapping Identity names to MFA methods. | @@ -1054,7 +1054,7 @@ ApiToken *string Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1068,7 +1068,7 @@ OrgName *string Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1082,7 +1082,7 @@ BaseUrl *string The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1094,7 +1094,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1111,7 +1111,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1125,7 +1125,7 @@ PrimaryEmail interface{} Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1139,7 +1139,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.java.md b/docs/identityMfaOkta.java.md index 78916dc4..1a62a8d8 100644 --- a/docs/identityMfaOkta.java.md +++ b/docs/identityMfaOkta.java.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -48,7 +48,7 @@ IdentityMfaOkta.Builder.create(Construct scope, java.lang.String id) | apiToken | java.lang.String | Okta API token. | | orgName | java.lang.String | Name of the organization to be used in the Okta API. | | baseUrl | java.lang.String | The base domain to use for API requests. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | primaryEmail | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -162,7 +162,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- @@ -644,7 +644,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1114,7 +1114,7 @@ IdentityMfaOktaConfig.builder() | apiToken | java.lang.String | Okta API token. | | orgName | java.lang.String | Name of the organization to be used in the Okta API. | | baseUrl | java.lang.String | The base domain to use for API requests. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | primaryEmail | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -1201,7 +1201,7 @@ public java.lang.String getApiToken(); Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1215,7 +1215,7 @@ public java.lang.String getOrgName(); Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1229,7 +1229,7 @@ public java.lang.String getBaseUrl(); The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1241,7 +1241,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1258,7 +1258,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1272,7 +1272,7 @@ public java.lang.Object getPrimaryEmail(); Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1286,7 +1286,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.python.md b/docs/identityMfaOkta.python.md index 1be28379..d05bd384 100644 --- a/docs/identityMfaOkta.python.md +++ b/docs/identityMfaOkta.python.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -45,7 +45,7 @@ identityMfaOkta.IdentityMfaOkta( | api_token | str | Okta API token. | | org_name | str | Name of the organization to be used in the Okta API. | | base_url | str | The base domain to use for API requests. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | str | Target namespace. (requires Enterprise). | | primary_email | typing.Union[bool, cdktf.IResolvable] | Only match the primary email for the account. | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- @@ -687,7 +687,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1152,7 +1152,7 @@ identityMfaOkta.IdentityMfaOktaConfig( | api_token | str | Okta API token. | | org_name | str | Name of the organization to be used in the Okta API. | | base_url | str | The base domain to use for API requests. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | str | Target namespace. (requires Enterprise). | | primary_email | typing.Union[bool, cdktf.IResolvable] | Only match the primary email for the account. | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -1239,7 +1239,7 @@ api_token: str Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1253,7 +1253,7 @@ org_name: str Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1267,7 +1267,7 @@ base_url: str The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1279,7 +1279,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1296,7 +1296,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1310,7 +1310,7 @@ primary_email: typing.Union[bool, IResolvable] Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1324,7 +1324,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaOkta.typescript.md b/docs/identityMfaOkta.typescript.md index 3feae98c..449947b7 100644 --- a/docs/identityMfaOkta.typescript.md +++ b/docs/identityMfaOkta.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta vault_identity_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityMfaOkta to import. The id of the existing IdentityMfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -952,7 +952,7 @@ const identityMfaOktaConfig: identityMfaOkta.IdentityMfaOktaConfig = { ... } | apiToken | string | Okta API token. | | orgName | string | Name of the organization to be used in the Okta API. | | baseUrl | string | The base domain to use for API requests. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. | | namespace | string | Target namespace. (requires Enterprise). | | primaryEmail | boolean \| cdktf.IResolvable | Only match the primary email for the account. | | usernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1039,7 +1039,7 @@ public readonly apiToken: string; Okta API token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#api_token IdentityMfaOkta#api_token} --- @@ -1053,7 +1053,7 @@ public readonly orgName: string; Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#org_name IdentityMfaOkta#org_name} --- @@ -1067,7 +1067,7 @@ public readonly baseUrl: string; The base domain to use for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#base_url IdentityMfaOkta#base_url} --- @@ -1079,7 +1079,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#id IdentityMfaOkta#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1096,7 +1096,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#namespace IdentityMfaOkta#namespace} --- @@ -1110,7 +1110,7 @@ public readonly primaryEmail: boolean | IResolvable; Only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#primary_email IdentityMfaOkta#primary_email} --- @@ -1124,7 +1124,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_okta#username_format IdentityMfaOkta#username_format} --- diff --git a/docs/identityMfaPingid.csharp.md b/docs/identityMfaPingid.csharp.md index e3b6a5c9..a41bfa94 100644 --- a/docs/identityMfaPingid.csharp.md +++ b/docs/identityMfaPingid.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -937,7 +937,7 @@ new IdentityMfaPingidConfig { | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | | SettingsFileBase64 | string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | UsernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1023,7 +1023,7 @@ public string SettingsFileBase64 { get; set; } A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1035,7 +1035,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1052,7 +1052,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1066,7 +1066,7 @@ public string UsernameFormat { get; set; } A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.go.md b/docs/identityMfaPingid.go.md index 8f409aeb..5c985403 100644 --- a/docs/identityMfaPingid.go.md +++ b/docs/identityMfaPingid.go.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -937,7 +937,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfapingid" | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | | SettingsFileBase64 | *string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | UsernameFormat | *string | A template string for mapping Identity names to MFA methods. | @@ -1023,7 +1023,7 @@ SettingsFileBase64 *string A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1035,7 +1035,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1052,7 +1052,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1066,7 +1066,7 @@ UsernameFormat *string A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.java.md b/docs/identityMfaPingid.java.md index c4d2681c..fe80a158 100644 --- a/docs/identityMfaPingid.java.md +++ b/docs/identityMfaPingid.java.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -42,7 +42,7 @@ IdentityMfaPingid.Builder.create(Construct scope, java.lang.String id) | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | settingsFileBase64 | java.lang.String | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -135,7 +135,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- @@ -593,7 +593,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1046,7 +1046,7 @@ IdentityMfaPingidConfig.builder() | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | | settingsFileBase64 | java.lang.String | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | usernameFormat | java.lang.String | A template string for mapping Identity names to MFA methods. | @@ -1132,7 +1132,7 @@ public java.lang.String getSettingsFileBase64(); A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1144,7 +1144,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1161,7 +1161,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1175,7 +1175,7 @@ public java.lang.String getUsernameFormat(); A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.python.md b/docs/identityMfaPingid.python.md index 7d823e44..b0d53643 100644 --- a/docs/identityMfaPingid.python.md +++ b/docs/identityMfaPingid.python.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -40,7 +40,7 @@ identityMfaPingid.IdentityMfaPingid( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | settings_file_base64 | str | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | str | Target namespace. (requires Enterprise). | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -133,7 +133,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- @@ -637,7 +637,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1086,7 +1086,7 @@ identityMfaPingid.IdentityMfaPingidConfig( | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | settings_file_base64 | str | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | str | Target namespace. (requires Enterprise). | | username_format | str | A template string for mapping Identity names to MFA methods. | @@ -1172,7 +1172,7 @@ settings_file_base64: str A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1184,7 +1184,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1201,7 +1201,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1215,7 +1215,7 @@ username_format: str A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaPingid.typescript.md b/docs/identityMfaPingid.typescript.md index 74718cb5..7f246d36 100644 --- a/docs/identityMfaPingid.typescript.md +++ b/docs/identityMfaPingid.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid vault_identity_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityMfaPingid to impor The id of the existing IdentityMfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -925,7 +925,7 @@ const identityMfaPingidConfig: identityMfaPingid.IdentityMfaPingidConfig = { ... | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | settingsFileBase64 | string | A base64-encoded third-party settings contents as retrieved from PingID's configuration page. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. | | namespace | string | Target namespace. (requires Enterprise). | | usernameFormat | string | A template string for mapping Identity names to MFA methods. | @@ -1011,7 +1011,7 @@ public readonly settingsFileBase64: string; A base64-encoded third-party settings contents as retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#settings_file_base64 IdentityMfaPingid#settings_file_base64} --- @@ -1023,7 +1023,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#id IdentityMfaPingid#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1040,7 +1040,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#namespace IdentityMfaPingid#namespace} --- @@ -1054,7 +1054,7 @@ public readonly usernameFormat: string; A template string for mapping Identity names to MFA methods. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_pingid#username_format IdentityMfaPingid#username_format} --- diff --git a/docs/identityMfaTotp.csharp.md b/docs/identityMfaTotp.csharp.md index f5b4cf28..2f8cf447 100644 --- a/docs/identityMfaTotp.csharp.md +++ b/docs/identityMfaTotp.csharp.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ new IdentityMfaTotpConfig { | Issuer | string | The name of the key's issuing organization. | | Algorithm | string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | Digits | double | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | KeySize | double | Specifies the size in bytes of the generated key. | | MaxValidationAttempts | double | The maximum number of consecutive failed validation attempts allowed. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1154,7 +1154,7 @@ public string Issuer { get; set; } The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1168,7 +1168,7 @@ public string Algorithm { get; set; } Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1182,7 +1182,7 @@ public double Digits { get; set; } The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1194,7 +1194,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1211,7 +1211,7 @@ public double KeySize { get; set; } Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1225,7 +1225,7 @@ public double MaxValidationAttempts { get; set; } The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1239,7 +1239,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1253,7 +1253,7 @@ public double Period { get; set; } The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1267,7 +1267,7 @@ public double QrSize { get; set; } The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1283,7 +1283,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.go.md b/docs/identityMfaTotp.go.md index 00ed9e3e..7a63c32b 100644 --- a/docs/identityMfaTotp.go.md +++ b/docs/identityMfaTotp.go.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1064,7 +1064,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identitymfatotp" | Issuer | *string | The name of the key's issuing organization. | | Algorithm | *string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | Digits | *f64 | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | KeySize | *f64 | Specifies the size in bytes of the generated key. | | MaxValidationAttempts | *f64 | The maximum number of consecutive failed validation attempts allowed. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1154,7 +1154,7 @@ Issuer *string The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1168,7 +1168,7 @@ Algorithm *string Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1182,7 +1182,7 @@ Digits *f64 The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1194,7 +1194,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1211,7 +1211,7 @@ KeySize *f64 Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1225,7 +1225,7 @@ MaxValidationAttempts *f64 The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1239,7 +1239,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1253,7 +1253,7 @@ Period *f64 The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1267,7 +1267,7 @@ QrSize *f64 The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1283,7 +1283,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.java.md b/docs/identityMfaTotp.java.md index b57a566d..58ddee13 100644 --- a/docs/identityMfaTotp.java.md +++ b/docs/identityMfaTotp.java.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -50,7 +50,7 @@ IdentityMfaTotp.Builder.create(Construct scope, java.lang.String id) | issuer | java.lang.String | The name of the key's issuing organization. | | algorithm | java.lang.String | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | java.lang.Number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | java.lang.Number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | java.lang.Number | The maximum number of consecutive failed validation attempts allowed. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -167,7 +167,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -219,7 +219,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- @@ -709,7 +709,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1247,7 +1247,7 @@ IdentityMfaTotpConfig.builder() | issuer | java.lang.String | The name of the key's issuing organization. | | algorithm | java.lang.String | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | java.lang.Number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | java.lang.Number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | java.lang.Number | The maximum number of consecutive failed validation attempts allowed. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1337,7 +1337,7 @@ public java.lang.String getIssuer(); The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1351,7 +1351,7 @@ public java.lang.String getAlgorithm(); Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1365,7 +1365,7 @@ public java.lang.Number getDigits(); The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1377,7 +1377,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1394,7 +1394,7 @@ public java.lang.Number getKeySize(); Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1408,7 +1408,7 @@ public java.lang.Number getMaxValidationAttempts(); The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1422,7 +1422,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1436,7 +1436,7 @@ public java.lang.Number getPeriod(); The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1450,7 +1450,7 @@ public java.lang.Number getQrSize(); The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1466,7 +1466,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.python.md b/docs/identityMfaTotp.python.md index ddadcaf0..d926f619 100644 --- a/docs/identityMfaTotp.python.md +++ b/docs/identityMfaTotp.python.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -48,7 +48,7 @@ identityMfaTotp.IdentityMfaTotp( | issuer | str | The name of the key's issuing organization. | | algorithm | str | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | typing.Union[int, float] | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | key_size | typing.Union[int, float] | Specifies the size in bytes of the generated key. | | max_validation_attempts | typing.Union[int, float] | The maximum number of consecutive failed validation attempts allowed. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -165,7 +165,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -217,7 +217,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- @@ -753,7 +753,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1287,7 +1287,7 @@ identityMfaTotp.IdentityMfaTotpConfig( | issuer | str | The name of the key's issuing organization. | | algorithm | str | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | typing.Union[int, float] | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | key_size | typing.Union[int, float] | Specifies the size in bytes of the generated key. | | max_validation_attempts | typing.Union[int, float] | The maximum number of consecutive failed validation attempts allowed. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1377,7 +1377,7 @@ issuer: str The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1391,7 +1391,7 @@ algorithm: str Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1405,7 +1405,7 @@ digits: typing.Union[int, float] The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1417,7 +1417,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1434,7 +1434,7 @@ key_size: typing.Union[int, float] Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1448,7 +1448,7 @@ max_validation_attempts: typing.Union[int, float] The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1462,7 +1462,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1476,7 +1476,7 @@ period: typing.Union[int, float] The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1490,7 +1490,7 @@ qr_size: typing.Union[int, float] The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1506,7 +1506,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityMfaTotp.typescript.md b/docs/identityMfaTotp.typescript.md index 8c772767..20035127 100644 --- a/docs/identityMfaTotp.typescript.md +++ b/docs/identityMfaTotp.typescript.md @@ -4,7 +4,7 @@ ### IdentityMfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp vault_identity_mfa_totp}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the IdentityMfaTotp to import. The id of the existing IdentityMfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1046,7 +1046,7 @@ const identityMfaTotpConfig: identityMfaTotp.IdentityMfaTotpConfig = { ... } | issuer | string | The name of the key's issuing organization. | | algorithm | string | Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. | | digits | number | The number of digits in the generated TOTP token. This value can either be 6 or 8. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. | | keySize | number | Specifies the size in bytes of the generated key. | | maxValidationAttempts | number | The maximum number of consecutive failed validation attempts allowed. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1136,7 +1136,7 @@ public readonly issuer: string; The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#issuer IdentityMfaTotp#issuer} --- @@ -1150,7 +1150,7 @@ public readonly algorithm: string; Specifies the hashing algorithm used to generate the TOTP code. Options include SHA1, SHA256, SHA512. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#algorithm IdentityMfaTotp#algorithm} --- @@ -1164,7 +1164,7 @@ public readonly digits: number; The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#digits IdentityMfaTotp#digits} --- @@ -1176,7 +1176,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#id IdentityMfaTotp#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1193,7 +1193,7 @@ public readonly keySize: number; Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#key_size IdentityMfaTotp#key_size} --- @@ -1207,7 +1207,7 @@ public readonly maxValidationAttempts: number; The maximum number of consecutive failed validation attempts allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#max_validation_attempts IdentityMfaTotp#max_validation_attempts} --- @@ -1221,7 +1221,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#namespace IdentityMfaTotp#namespace} --- @@ -1235,7 +1235,7 @@ public readonly period: number; The length of time in seconds used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#period IdentityMfaTotp#period} --- @@ -1249,7 +1249,7 @@ public readonly qrSize: number; The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#qr_size IdentityMfaTotp#qr_size} --- @@ -1265,7 +1265,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_mfa_totp#skew IdentityMfaTotp#skew} --- diff --git a/docs/identityOidc.csharp.md b/docs/identityOidc.csharp.md index 6c27bddb..e80706d0 100644 --- a/docs/identityOidc.csharp.md +++ b/docs/identityOidc.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -781,7 +781,7 @@ new IdentityOidcConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | Issuer | string | Issuer URL to be used in the iss claim of the token. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -865,7 +865,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -884,7 +884,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -898,7 +898,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.go.md b/docs/identityOidc.go.md index ca40205c..c6ed9765 100644 --- a/docs/identityOidc.go.md +++ b/docs/identityOidc.go.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -781,7 +781,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidc" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | Issuer | *string | Issuer URL to be used in the iss claim of the token. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -865,7 +865,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -884,7 +884,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -898,7 +898,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.java.md b/docs/identityOidc.java.md index ac7b0048..734a08f6 100644 --- a/docs/identityOidc.java.md +++ b/docs/identityOidc.java.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -40,7 +40,7 @@ IdentityOidc.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | java.lang.String | Issuer URL to be used in the iss claim of the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -110,7 +110,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -125,7 +125,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -135,7 +135,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- @@ -583,7 +583,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -880,7 +880,7 @@ IdentityOidcConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | java.lang.String | Issuer URL to be used in the iss claim of the token. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -964,7 +964,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -983,7 +983,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -997,7 +997,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.python.md b/docs/identityOidc.python.md index e5a62ac8..d5404b8b 100644 --- a/docs/identityOidc.python.md +++ b/docs/identityOidc.python.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -38,7 +38,7 @@ identityOidc.IdentityOidc( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | str | Issuer URL to be used in the iss claim of the token. | | namespace | str | Target namespace. (requires Enterprise). | @@ -108,7 +108,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -123,7 +123,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- @@ -627,7 +627,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ identityOidc.IdentityOidcConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | str | Issuer URL to be used in the iss claim of the token. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1004,7 +1004,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1023,7 +1023,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -1037,7 +1037,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidc.typescript.md b/docs/identityOidc.typescript.md index 36e32617..18b409a9 100644 --- a/docs/identityOidc.typescript.md +++ b/docs/identityOidc.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidc -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc vault_identity_oidc}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc vault_identity_oidc}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the IdentityOidc to import. The id of the existing IdentityOidc that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#import import section} in the documentation of this resource for the id to use --- @@ -770,7 +770,7 @@ const identityOidcConfig: identityOidc.IdentityOidcConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. | | issuer | string | Issuer URL to be used in the iss claim of the token. | | namespace | string | Target namespace. (requires Enterprise). | @@ -854,7 +854,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#id IdentityOidc#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#id IdentityOidc#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -873,7 +873,7 @@ Issuer URL to be used in the iss claim of the token. If not set, Vault's api_addr will be used. The issuer is a case sensitive URL using the https scheme that contains scheme, host, and optionally, port number and path components, but no query or fragment components. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#issuer IdentityOidc#issuer} --- @@ -887,7 +887,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc#namespace IdentityOidc#namespace} --- diff --git a/docs/identityOidcAssignment.csharp.md b/docs/identityOidcAssignment.csharp.md index 64528ffc..2678c148 100644 --- a/docs/identityOidcAssignment.csharp.md +++ b/docs/identityOidcAssignment.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -837,7 +837,7 @@ new IdentityOidcAssignmentConfig { | Name | string | The name of the assignment. | | EntityIds | string[] | A list of Vault entity IDs. | | GroupIds | string[] | A list of Vault group IDs. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ public string Name { get; set; } The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -936,7 +936,7 @@ public string[] EntityIds { get; set; } A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -950,7 +950,7 @@ public string[] GroupIds { get; set; } A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -962,7 +962,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.go.md b/docs/identityOidcAssignment.go.md index 86b77db8..3f8448d4 100644 --- a/docs/identityOidcAssignment.go.md +++ b/docs/identityOidcAssignment.go.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -837,7 +837,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcassignmen | Name | *string | The name of the assignment. | | EntityIds | *[]*string | A list of Vault entity IDs. | | GroupIds | *[]*string | A list of Vault group IDs. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -922,7 +922,7 @@ Name *string The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -936,7 +936,7 @@ EntityIds *[]*string A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -950,7 +950,7 @@ GroupIds *[]*string A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -962,7 +962,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -979,7 +979,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.java.md b/docs/identityOidcAssignment.java.md index 15940d54..d159ae2e 100644 --- a/docs/identityOidcAssignment.java.md +++ b/docs/identityOidcAssignment.java.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -45,7 +45,7 @@ IdentityOidcAssignment.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the assignment. | | entityIds | java.util.List | A list of Vault entity IDs. | | groupIds | java.util.List | A list of Vault group IDs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -958,7 +958,7 @@ IdentityOidcAssignmentConfig.builder() | name | java.lang.String | The name of the assignment. | | entityIds | java.util.List | A list of Vault entity IDs. | | groupIds | java.util.List | A list of Vault group IDs. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1043,7 +1043,7 @@ public java.lang.String getName(); The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -1057,7 +1057,7 @@ public java.util.List getEntityIds(); A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -1071,7 +1071,7 @@ public java.util.List getGroupIds(); A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -1083,7 +1083,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1100,7 +1100,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.python.md b/docs/identityOidcAssignment.python.md index 6b579c76..5a2df95d 100644 --- a/docs/identityOidcAssignment.python.md +++ b/docs/identityOidcAssignment.python.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -43,7 +43,7 @@ identityOidcAssignment.IdentityOidcAssignment( | name | str | The name of the assignment. | | entity_ids | typing.List[str] | A list of Vault entity IDs. | | group_ids | typing.List[str] | A list of Vault group IDs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -998,7 +998,7 @@ identityOidcAssignment.IdentityOidcAssignmentConfig( | name | str | The name of the assignment. | | entity_ids | typing.List[str] | A list of Vault entity IDs. | | group_ids | typing.List[str] | A list of Vault group IDs. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1083,7 +1083,7 @@ name: str The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -1097,7 +1097,7 @@ entity_ids: typing.List[str] A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -1111,7 +1111,7 @@ group_ids: typing.List[str] A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -1123,7 +1123,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1140,7 +1140,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcAssignment.typescript.md b/docs/identityOidcAssignment.typescript.md index 272e6788..4774e202 100644 --- a/docs/identityOidcAssignment.typescript.md +++ b/docs/identityOidcAssignment.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcAssignment -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment vault_identity_oidc_assignment}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcAssignment to The id of the existing IdentityOidcAssignment that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#import import section} in the documentation of this resource for the id to use --- @@ -824,7 +824,7 @@ const identityOidcAssignmentConfig: identityOidcAssignment.IdentityOidcAssignmen | name | string | The name of the assignment. | | entityIds | string[] | A list of Vault entity IDs. | | groupIds | string[] | A list of Vault group IDs. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -909,7 +909,7 @@ public readonly name: string; The name of the assignment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#name IdentityOidcAssignment#name} --- @@ -923,7 +923,7 @@ public readonly entityIds: string[]; A list of Vault entity IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#entity_ids IdentityOidcAssignment#entity_ids} --- @@ -937,7 +937,7 @@ public readonly groupIds: string[]; A list of Vault group IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#group_ids IdentityOidcAssignment#group_ids} --- @@ -949,7 +949,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#id IdentityOidcAssignment#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -966,7 +966,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_assignment#namespace IdentityOidcAssignment#namespace} --- diff --git a/docs/identityOidcClient.csharp.md b/docs/identityOidcClient.csharp.md index 06abbc03..ad5a1dfb 100644 --- a/docs/identityOidcClient.csharp.md +++ b/docs/identityOidcClient.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ new IdentityOidcClientConfig { | AccessTokenTtl | double | The time-to-live for access tokens obtained by the client. | | Assignments | string[] | A list of assignment resources associated with the client. | | ClientType | string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | IdTokenTtl | double | The time-to-live for ID tokens obtained by the client. | | Key | string | A reference to a named key resource in Vault. This cannot be modified after creation. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ public string Name { get; set; } The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1082,7 +1082,7 @@ public double AccessTokenTtl { get; set; } The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1096,7 +1096,7 @@ public string[] Assignments { get; set; } A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1110,7 +1110,7 @@ public string ClientType { get; set; } The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1122,7 +1122,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1155,7 +1155,7 @@ public string Key { get; set; } A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1169,7 +1169,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1185,7 +1185,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.go.md b/docs/identityOidcClient.go.md index 47f8a022..42b32061 100644 --- a/docs/identityOidcClient.go.md +++ b/docs/identityOidcClient.go.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -980,7 +980,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcclient" | AccessTokenTtl | *f64 | The time-to-live for access tokens obtained by the client. | | Assignments | *[]*string | A list of assignment resources associated with the client. | | ClientType | *string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | IdTokenTtl | *f64 | The time-to-live for ID tokens obtained by the client. | | Key | *string | A reference to a named key resource in Vault. This cannot be modified after creation. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1068,7 +1068,7 @@ Name *string The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1082,7 +1082,7 @@ AccessTokenTtl *f64 The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1096,7 +1096,7 @@ Assignments *[]*string A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1110,7 +1110,7 @@ ClientType *string The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1122,7 +1122,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1141,7 +1141,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1155,7 +1155,7 @@ Key *string A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1169,7 +1169,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1185,7 +1185,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.java.md b/docs/identityOidcClient.java.md index ed14f309..949ba1fb 100644 --- a/docs/identityOidcClient.java.md +++ b/docs/identityOidcClient.java.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -50,7 +50,7 @@ IdentityOidcClient.Builder.create(Construct scope, java.lang.String id) | accessTokenTtl | java.lang.Number | The time-to-live for access tokens obtained by the client. | | assignments | java.util.List | A list of assignment resources associated with the client. | | clientType | java.lang.String | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | java.lang.Number | The time-to-live for ID tokens obtained by the client. | | key | java.lang.String | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -209,7 +209,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- @@ -692,7 +692,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -1153,7 +1153,7 @@ IdentityOidcClientConfig.builder() | accessTokenTtl | java.lang.Number | The time-to-live for access tokens obtained by the client. | | assignments | java.util.List | A list of assignment resources associated with the client. | | clientType | java.lang.String | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | java.lang.Number | The time-to-live for ID tokens obtained by the client. | | key | java.lang.String | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1241,7 +1241,7 @@ public java.lang.String getName(); The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1255,7 +1255,7 @@ public java.lang.Number getAccessTokenTtl(); The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1269,7 +1269,7 @@ public java.util.List getAssignments(); A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1283,7 +1283,7 @@ public java.lang.String getClientType(); The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1295,7 +1295,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1314,7 +1314,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1328,7 +1328,7 @@ public java.lang.String getKey(); A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1342,7 +1342,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1358,7 +1358,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.python.md b/docs/identityOidcClient.python.md index 7b34450c..266c4474 100644 --- a/docs/identityOidcClient.python.md +++ b/docs/identityOidcClient.python.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -48,7 +48,7 @@ identityOidcClient.IdentityOidcClient( | access_token_ttl | typing.Union[int, float] | The time-to-live for access tokens obtained by the client. | | assignments | typing.List[str] | A list of assignment resources associated with the client. | | client_type | str | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | id_token_ttl | typing.Union[int, float] | The time-to-live for ID tokens obtained by the client. | | key | str | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | str | Target namespace. (requires Enterprise). | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +175,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -207,7 +207,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- @@ -736,7 +736,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -1193,7 +1193,7 @@ identityOidcClient.IdentityOidcClientConfig( | access_token_ttl | typing.Union[int, float] | The time-to-live for access tokens obtained by the client. | | assignments | typing.List[str] | A list of assignment resources associated with the client. | | client_type | str | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | id_token_ttl | typing.Union[int, float] | The time-to-live for ID tokens obtained by the client. | | key | str | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1281,7 +1281,7 @@ name: str The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1295,7 +1295,7 @@ access_token_ttl: typing.Union[int, float] The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1309,7 +1309,7 @@ assignments: typing.List[str] A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1323,7 +1323,7 @@ client_type: str The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1335,7 +1335,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1354,7 +1354,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1368,7 +1368,7 @@ key: str A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1382,7 +1382,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1398,7 +1398,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcClient.typescript.md b/docs/identityOidcClient.typescript.md index 045a34ed..b700f519 100644 --- a/docs/identityOidcClient.typescript.md +++ b/docs/identityOidcClient.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcClient -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client vault_identity_oidc_client}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the IdentityOidcClient to impo The id of the existing IdentityOidcClient that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#import import section} in the documentation of this resource for the id to use --- @@ -963,7 +963,7 @@ const identityOidcClientConfig: identityOidcClient.IdentityOidcClientConfig = { | accessTokenTtl | number | The time-to-live for access tokens obtained by the client. | | assignments | string[] | A list of assignment resources associated with the client. | | clientType | string | The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. | | idTokenTtl | number | The time-to-live for ID tokens obtained by the client. | | key | string | A reference to a named key resource in Vault. This cannot be modified after creation. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1051,7 +1051,7 @@ public readonly name: string; The name of the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#name IdentityOidcClient#name} --- @@ -1065,7 +1065,7 @@ public readonly accessTokenTtl: number; The time-to-live for access tokens obtained by the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#access_token_ttl IdentityOidcClient#access_token_ttl} --- @@ -1079,7 +1079,7 @@ public readonly assignments: string[]; A list of assignment resources associated with the client. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#assignments IdentityOidcClient#assignments} --- @@ -1093,7 +1093,7 @@ public readonly clientType: string; The client type based on its ability to maintain confidentiality of credentials.Defaults to 'confidential'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#client_type IdentityOidcClient#client_type} --- @@ -1105,7 +1105,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id IdentityOidcClient#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1124,7 +1124,7 @@ The time-to-live for ID tokens obtained by the client. The value should be less than the verification_ttl on the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#id_token_ttl IdentityOidcClient#id_token_ttl} --- @@ -1138,7 +1138,7 @@ public readonly key: string; A reference to a named key resource in Vault. This cannot be modified after creation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#key IdentityOidcClient#key} --- @@ -1152,7 +1152,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#namespace IdentityOidcClient#namespace} --- @@ -1168,7 +1168,7 @@ Redirection URI values used by the client. One of these values must exactly match the redirect_uri parameter value used in each authentication request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_client#redirect_uris IdentityOidcClient#redirect_uris} --- diff --git a/docs/identityOidcKey.csharp.md b/docs/identityOidcKey.csharp.md index 29a673bf..aef0c4bf 100644 --- a/docs/identityOidcKey.csharp.md +++ b/docs/identityOidcKey.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -897,7 +897,7 @@ new IdentityOidcKeyConfig { | Name | string | Name of the key. | | Algorithm | string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | AllowedClientIds | string[] | Array of role client ids allowed to use this key for signing. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | RotationPeriod | double | How often to generate a new signing key in number of seconds. | | VerificationTtl | double | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -984,7 +984,7 @@ public string Name { get; set; } Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -998,7 +998,7 @@ public string Algorithm { get; set; } Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1014,7 +1014,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1026,7 +1026,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1043,7 +1043,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1057,7 +1057,7 @@ public double RotationPeriod { get; set; } How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1071,7 +1071,7 @@ public double VerificationTtl { get; set; } Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.go.md b/docs/identityOidcKey.go.md index 68b220c7..bf364451 100644 --- a/docs/identityOidcKey.go.md +++ b/docs/identityOidcKey.go.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -897,7 +897,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckey" | Name | *string | Name of the key. | | Algorithm | *string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | AllowedClientIds | *[]*string | Array of role client ids allowed to use this key for signing. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | RotationPeriod | *f64 | How often to generate a new signing key in number of seconds. | | VerificationTtl | *f64 | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -984,7 +984,7 @@ Name *string Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -998,7 +998,7 @@ Algorithm *string Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1014,7 +1014,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1026,7 +1026,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1043,7 +1043,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1057,7 +1057,7 @@ RotationPeriod *f64 How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1071,7 +1071,7 @@ VerificationTtl *f64 Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.java.md b/docs/identityOidcKey.java.md index 9f345608..99d2735f 100644 --- a/docs/identityOidcKey.java.md +++ b/docs/identityOidcKey.java.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -47,7 +47,7 @@ IdentityOidcKey.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the key. | | algorithm | java.lang.String | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | java.util.List | Array of role client ids allowed to use this key for signing. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | How often to generate a new signing key in number of seconds. | | verificationTtl | java.lang.Number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -142,7 +142,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- @@ -652,7 +652,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -1044,7 +1044,7 @@ IdentityOidcKeyConfig.builder() | name | java.lang.String | Name of the key. | | algorithm | java.lang.String | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | java.util.List | Array of role client ids allowed to use this key for signing. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | rotationPeriod | java.lang.Number | How often to generate a new signing key in number of seconds. | | verificationTtl | java.lang.Number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -1131,7 +1131,7 @@ public java.lang.String getName(); Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -1145,7 +1145,7 @@ public java.lang.String getAlgorithm(); Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1161,7 +1161,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1173,7 +1173,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1190,7 +1190,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1204,7 +1204,7 @@ public java.lang.Number getRotationPeriod(); How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1218,7 +1218,7 @@ public java.lang.Number getVerificationTtl(); Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.python.md b/docs/identityOidcKey.python.md index f5a8bcf1..db288e05 100644 --- a/docs/identityOidcKey.python.md +++ b/docs/identityOidcKey.python.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -45,7 +45,7 @@ identityOidcKey.IdentityOidcKey( | name | str | Name of the key. | | algorithm | str | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowed_client_ids | typing.List[str] | Array of role client ids allowed to use this key for signing. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | How often to generate a new signing key in number of seconds. | | verification_ttl | typing.Union[int, float] | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -140,7 +140,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- @@ -696,7 +696,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -1084,7 +1084,7 @@ identityOidcKey.IdentityOidcKeyConfig( | name | str | Name of the key. | | algorithm | str | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowed_client_ids | typing.List[str] | Array of role client ids allowed to use this key for signing. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | str | Target namespace. (requires Enterprise). | | rotation_period | typing.Union[int, float] | How often to generate a new signing key in number of seconds. | | verification_ttl | typing.Union[int, float] | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -1171,7 +1171,7 @@ name: str Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -1185,7 +1185,7 @@ algorithm: str Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -1201,7 +1201,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1213,7 +1213,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1230,7 +1230,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1244,7 +1244,7 @@ rotation_period: typing.Union[int, float] How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1258,7 +1258,7 @@ verification_ttl: typing.Union[int, float] Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKey.typescript.md b/docs/identityOidcKey.typescript.md index 9e1ff339..a3ecb912 100644 --- a/docs/identityOidcKey.typescript.md +++ b/docs/identityOidcKey.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcKey -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key vault_identity_oidc_key}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcKey to import. The id of the existing IdentityOidcKey that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#import import section} in the documentation of this resource for the id to use --- @@ -882,7 +882,7 @@ const identityOidcKeyConfig: identityOidcKey.IdentityOidcKeyConfig = { ... } | name | string | Name of the key. | | algorithm | string | Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. | | allowedClientIds | string[] | Array of role client ids allowed to use this key for signing. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. | | namespace | string | Target namespace. (requires Enterprise). | | rotationPeriod | number | How often to generate a new signing key in number of seconds. | | verificationTtl | number | Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. | @@ -969,7 +969,7 @@ public readonly name: string; Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#name IdentityOidcKey#name} --- @@ -983,7 +983,7 @@ public readonly algorithm: string; Signing algorithm to use. Signing algorithm to use. Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#algorithm IdentityOidcKey#algorithm} --- @@ -999,7 +999,7 @@ Array of role client ids allowed to use this key for signing. If empty, no roles are allowed. If "*", all roles are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#allowed_client_ids IdentityOidcKey#allowed_client_ids} --- @@ -1011,7 +1011,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#id IdentityOidcKey#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1028,7 +1028,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#namespace IdentityOidcKey#namespace} --- @@ -1042,7 +1042,7 @@ public readonly rotationPeriod: number; How often to generate a new signing key in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#rotation_period IdentityOidcKey#rotation_period} --- @@ -1056,7 +1056,7 @@ public readonly verificationTtl: number; Controls how long the public portion of a signing key will be available for verification after being rotated in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key#verification_ttl IdentityOidcKey#verification_ttl} --- diff --git a/docs/identityOidcKeyAllowedClientId.csharp.md b/docs/identityOidcKeyAllowedClientId.csharp.md index 5e5e5bf0..35d66aaa 100644 --- a/docs/identityOidcKeyAllowedClientId.csharp.md +++ b/docs/identityOidcKeyAllowedClientId.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new IdentityOidcKeyAllowedClientIdConfig { | Provisioners | object[] | *No description.* | | AllowedClientId | string | Role Client ID allowed to use the key for signing. | | KeyName | string | Name of the key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string AllowedClientId { get; set; } Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -898,7 +898,7 @@ public string KeyName { get; set; } Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.go.md b/docs/identityOidcKeyAllowedClientId.go.md index 7bc1abdd..36f29522 100644 --- a/docs/identityOidcKeyAllowedClientId.go.md +++ b/docs/identityOidcKeyAllowedClientId.go.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidckeyallowe | Provisioners | *[]interface{} | *No description.* | | AllowedClientId | *string | Role Client ID allowed to use the key for signing. | | KeyName | *string | Name of the key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ AllowedClientId *string Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -898,7 +898,7 @@ KeyName *string Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.java.md b/docs/identityOidcKeyAllowedClientId.java.md index ed5d8d49..58704237 100644 --- a/docs/identityOidcKeyAllowedClientId.java.md +++ b/docs/identityOidcKeyAllowedClientId.java.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -43,7 +43,7 @@ IdentityOidcKeyAllowedClientId.Builder.create(Construct scope, java.lang.String | provisioners | java.util.List | *No description.* | | allowedClientId | java.lang.String | Role Client ID allowed to use the key for signing. | | keyName | java.lang.String | Name of the key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ IdentityOidcKeyAllowedClientIdConfig.builder() | provisioners | java.util.List | *No description.* | | allowedClientId | java.lang.String | Role Client ID allowed to use the key for signing. | | keyName | java.lang.String | Name of the key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getAllowedClientId(); Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -1007,7 +1007,7 @@ public java.lang.String getKeyName(); Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.python.md b/docs/identityOidcKeyAllowedClientId.python.md index 2a84c9ba..ecc9fa3c 100644 --- a/docs/identityOidcKeyAllowedClientId.python.md +++ b/docs/identityOidcKeyAllowedClientId.python.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -41,7 +41,7 @@ identityOidcKeyAllowedClientId.IdentityOidcKeyAllowedClientId( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | allowed_client_id | str | Role Client ID allowed to use the key for signing. | | key_name | str | Name of the key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ identityOidcKeyAllowedClientId.IdentityOidcKeyAllowedClientIdConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | allowed_client_id | str | Role Client ID allowed to use the key for signing. | | key_name | str | Name of the key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ allowed_client_id: str Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -1047,7 +1047,7 @@ key_name: str Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcKeyAllowedClientId.typescript.md b/docs/identityOidcKeyAllowedClientId.typescript.md index 5af82fa2..ea3a4c57 100644 --- a/docs/identityOidcKeyAllowedClientId.typescript.md +++ b/docs/identityOidcKeyAllowedClientId.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcKeyAllowedClientId -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id vault_identity_oidc_key_allowed_client_id}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the IdentityOidcKeyAllowedClie The id of the existing IdentityOidcKeyAllowedClientId that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const identityOidcKeyAllowedClientIdConfig: identityOidcKeyAllowedClientId.Ident | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | allowedClientId | string | Role Client ID allowed to use the key for signing. | | keyName | string | Name of the key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly allowedClientId: string; Role Client ID allowed to use the key for signing. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#allowed_client_id IdentityOidcKeyAllowedClientId#allowed_client_id} --- @@ -886,7 +886,7 @@ public readonly keyName: string; Name of the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#key_name IdentityOidcKeyAllowedClientId#key_name} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#id IdentityOidcKeyAllowedClientId#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_key_allowed_client_id#namespace IdentityOidcKeyAllowedClientId#namespace} --- diff --git a/docs/identityOidcProvider.csharp.md b/docs/identityOidcProvider.csharp.md index 8e17c95e..bf88a961 100644 --- a/docs/identityOidcProvider.csharp.md +++ b/docs/identityOidcProvider.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ new IdentityOidcProviderConfig { | Name | string | The name of the provider. | | AllowedClientIds | string[] | The client IDs that are permitted to use the provider. | | HttpsEnabled | object | Set to true if the issuer endpoint uses HTTPS. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | IssuerHost | string | The host for the issuer. Can be either host or host:port. | | Namespace | string | Target namespace. (requires Enterprise). | | ScopesSupported | string[] | The scopes available for requesting on the provider. | @@ -995,7 +995,7 @@ public string Name { get; set; } The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1011,7 +1011,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1025,7 +1025,7 @@ public object HttpsEnabled { get; set; } Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1037,7 +1037,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1054,7 +1054,7 @@ public string IssuerHost { get; set; } The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1068,7 +1068,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1082,7 +1082,7 @@ public string[] ScopesSupported { get; set; } The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.go.md b/docs/identityOidcProvider.go.md index dd0a1212..48797b26 100644 --- a/docs/identityOidcProvider.go.md +++ b/docs/identityOidcProvider.go.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcprovider" | Name | *string | The name of the provider. | | AllowedClientIds | *[]*string | The client IDs that are permitted to use the provider. | | HttpsEnabled | interface{} | Set to true if the issuer endpoint uses HTTPS. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | IssuerHost | *string | The host for the issuer. Can be either host or host:port. | | Namespace | *string | Target namespace. (requires Enterprise). | | ScopesSupported | *[]*string | The scopes available for requesting on the provider. | @@ -995,7 +995,7 @@ Name *string The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1011,7 +1011,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1025,7 +1025,7 @@ HttpsEnabled interface{} Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1037,7 +1037,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1054,7 +1054,7 @@ IssuerHost *string The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1068,7 +1068,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1082,7 +1082,7 @@ ScopesSupported *[]*string The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.java.md b/docs/identityOidcProvider.java.md index 5d2bf694..a6474014 100644 --- a/docs/identityOidcProvider.java.md +++ b/docs/identityOidcProvider.java.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -48,7 +48,7 @@ IdentityOidcProvider.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the provider. | | allowedClientIds | java.util.List | The client IDs that are permitted to use the provider. | | httpsEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | java.lang.String | The host for the issuer. Can be either host or host:port. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | scopesSupported | java.util.List | The scopes available for requesting on the provider. | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -133,7 +133,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -164,7 +164,7 @@ If you experience problems setting this value it might not be settable. Please t The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- @@ -653,7 +653,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -1057,7 +1057,7 @@ IdentityOidcProviderConfig.builder() | name | java.lang.String | The name of the provider. | | allowedClientIds | java.util.List | The client IDs that are permitted to use the provider. | | httpsEnabled | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | java.lang.String | The host for the issuer. Can be either host or host:port. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | scopesSupported | java.util.List | The scopes available for requesting on the provider. | @@ -1144,7 +1144,7 @@ public java.lang.String getName(); The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1160,7 +1160,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1174,7 +1174,7 @@ public java.lang.Object getHttpsEnabled(); Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1186,7 +1186,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1203,7 +1203,7 @@ public java.lang.String getIssuerHost(); The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1217,7 +1217,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1231,7 +1231,7 @@ public java.util.List getScopesSupported(); The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.python.md b/docs/identityOidcProvider.python.md index c03aba5b..eabdc28b 100644 --- a/docs/identityOidcProvider.python.md +++ b/docs/identityOidcProvider.python.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -45,7 +45,7 @@ identityOidcProvider.IdentityOidcProvider( | name | str | The name of the provider. | | allowed_client_ids | typing.List[str] | The client IDs that are permitted to use the provider. | | https_enabled | typing.Union[bool, cdktf.IResolvable] | Set to true if the issuer endpoint uses HTTPS. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuer_host | str | The host for the issuer. Can be either host or host:port. | | namespace | str | Target namespace. (requires Enterprise). | | scopes_supported | typing.List[str] | The scopes available for requesting on the provider. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -130,7 +130,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- @@ -696,7 +696,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -1095,7 +1095,7 @@ identityOidcProvider.IdentityOidcProviderConfig( | name | str | The name of the provider. | | allowed_client_ids | typing.List[str] | The client IDs that are permitted to use the provider. | | https_enabled | typing.Union[bool, cdktf.IResolvable] | Set to true if the issuer endpoint uses HTTPS. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuer_host | str | The host for the issuer. Can be either host or host:port. | | namespace | str | Target namespace. (requires Enterprise). | | scopes_supported | typing.List[str] | The scopes available for requesting on the provider. | @@ -1182,7 +1182,7 @@ name: str The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -1198,7 +1198,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1212,7 +1212,7 @@ https_enabled: typing.Union[bool, IResolvable] Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1224,7 +1224,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1241,7 +1241,7 @@ issuer_host: str The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1255,7 +1255,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1269,7 +1269,7 @@ scopes_supported: typing.List[str] The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcProvider.typescript.md b/docs/identityOidcProvider.typescript.md index f3f3c59d..394fd168 100644 --- a/docs/identityOidcProvider.typescript.md +++ b/docs/identityOidcProvider.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcProvider -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider vault_identity_oidc_provider}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the IdentityOidcProvider to im The id of the existing IdentityOidcProvider that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#import import section} in the documentation of this resource for the id to use --- @@ -893,7 +893,7 @@ const identityOidcProviderConfig: identityOidcProvider.IdentityOidcProviderConfi | name | string | The name of the provider. | | allowedClientIds | string[] | The client IDs that are permitted to use the provider. | | httpsEnabled | boolean \| cdktf.IResolvable | Set to true if the issuer endpoint uses HTTPS. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. | | issuerHost | string | The host for the issuer. Can be either host or host:port. | | namespace | string | Target namespace. (requires Enterprise). | | scopesSupported | string[] | The scopes available for requesting on the provider. | @@ -980,7 +980,7 @@ public readonly name: string; The name of the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#name IdentityOidcProvider#name} --- @@ -996,7 +996,7 @@ The client IDs that are permitted to use the provider. If empty, no clients are allowed. If "*", all clients are allowed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#allowed_client_ids IdentityOidcProvider#allowed_client_ids} --- @@ -1010,7 +1010,7 @@ public readonly httpsEnabled: boolean | IResolvable; Set to true if the issuer endpoint uses HTTPS. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#https_enabled IdentityOidcProvider#https_enabled} --- @@ -1022,7 +1022,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#id IdentityOidcProvider#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1039,7 +1039,7 @@ public readonly issuerHost: string; The host for the issuer. Can be either host or host:port. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#issuer_host IdentityOidcProvider#issuer_host} --- @@ -1053,7 +1053,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#namespace IdentityOidcProvider#namespace} --- @@ -1067,7 +1067,7 @@ public readonly scopesSupported: string[]; The scopes available for requesting on the provider. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_provider#scopes_supported IdentityOidcProvider#scopes_supported} --- diff --git a/docs/identityOidcRole.csharp.md b/docs/identityOidcRole.csharp.md index 8702c56b..7e2b7799 100644 --- a/docs/identityOidcRole.csharp.md +++ b/docs/identityOidcRole.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new IdentityOidcRoleConfig { | Key | string | A configured named key, the key must already exist. | | Name | string | Name of the role. | | ClientId | string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Template | string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | Ttl | double | TTL of the tokens generated against the role in number of seconds. | @@ -977,7 +977,7 @@ public string Key { get; set; } A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -991,7 +991,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1005,7 +1005,7 @@ public string ClientId { get; set; } The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1048,7 +1048,7 @@ public string Template { get; set; } The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1062,7 +1062,7 @@ public double Ttl { get; set; } TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.go.md b/docs/identityOidcRole.go.md index dc94b82b..b1b161d3 100644 --- a/docs/identityOidcRole.go.md +++ b/docs/identityOidcRole.go.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcrole" | Key | *string | A configured named key, the key must already exist. | | Name | *string | Name of the role. | | ClientId | *string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Template | *string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | Ttl | *f64 | TTL of the tokens generated against the role in number of seconds. | @@ -977,7 +977,7 @@ Key *string A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -991,7 +991,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1005,7 +1005,7 @@ ClientId *string The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1048,7 +1048,7 @@ Template *string The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1062,7 +1062,7 @@ Ttl *f64 TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.java.md b/docs/identityOidcRole.java.md index 6882ccc7..f89dc2f4 100644 --- a/docs/identityOidcRole.java.md +++ b/docs/identityOidcRole.java.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -47,7 +47,7 @@ IdentityOidcRole.Builder.create(Construct scope, java.lang.String id) | key | java.lang.String | A configured named key, the key must already exist. | | name | java.lang.String | Name of the role. | | clientId | java.lang.String | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | java.lang.Number | TTL of the tokens generated against the role in number of seconds. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- @@ -643,7 +643,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -1035,7 +1035,7 @@ IdentityOidcRoleConfig.builder() | key | java.lang.String | A configured named key, the key must already exist. | | name | java.lang.String | Name of the role. | | clientId | java.lang.String | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | java.lang.Number | TTL of the tokens generated against the role in number of seconds. | @@ -1122,7 +1122,7 @@ public java.lang.String getKey(); A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -1136,7 +1136,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1150,7 +1150,7 @@ public java.lang.String getClientId(); The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1162,7 +1162,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1179,7 +1179,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1193,7 +1193,7 @@ public java.lang.String getTemplate(); The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1207,7 +1207,7 @@ public java.lang.Number getTtl(); TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.python.md b/docs/identityOidcRole.python.md index 4d4a130a..cf4b1314 100644 --- a/docs/identityOidcRole.python.md +++ b/docs/identityOidcRole.python.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -45,7 +45,7 @@ identityOidcRole.IdentityOidcRole( | key | str | A configured named key, the key must already exist. | | name | str | Name of the role. | | client_id | str | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | typing.Union[int, float] | TTL of the tokens generated against the role in number of seconds. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- @@ -687,7 +687,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -1075,7 +1075,7 @@ identityOidcRole.IdentityOidcRoleConfig( | key | str | A configured named key, the key must already exist. | | name | str | Name of the role. | | client_id | str | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | typing.Union[int, float] | TTL of the tokens generated against the role in number of seconds. | @@ -1162,7 +1162,7 @@ key: str A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -1176,7 +1176,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -1190,7 +1190,7 @@ client_id: str The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1202,7 +1202,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1219,7 +1219,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1233,7 +1233,7 @@ template: str The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1247,7 +1247,7 @@ ttl: typing.Union[int, float] TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcRole.typescript.md b/docs/identityOidcRole.typescript.md index d2369b4e..6bfebc6d 100644 --- a/docs/identityOidcRole.typescript.md +++ b/docs/identityOidcRole.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role vault_identity_oidc_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the IdentityOidcRole to import The id of the existing IdentityOidcRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const identityOidcRoleConfig: identityOidcRole.IdentityOidcRoleConfig = { ... } | key | string | A configured named key, the key must already exist. | | name | string | Name of the role. | | clientId | string | The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | template | string | The template string to use for generating tokens. This may be in string-ified JSON or base64 format. | | ttl | number | TTL of the tokens generated against the role in number of seconds. | @@ -962,7 +962,7 @@ public readonly key: string; A configured named key, the key must already exist. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#key IdentityOidcRole#key} --- @@ -976,7 +976,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#name IdentityOidcRole#name} --- @@ -990,7 +990,7 @@ public readonly clientId: string; The value that will be included in the `aud` field of all the OIDC identity tokens issued by this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#client_id IdentityOidcRole#client_id} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#id IdentityOidcRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#namespace IdentityOidcRole#namespace} --- @@ -1033,7 +1033,7 @@ public readonly template: string; The template string to use for generating tokens. This may be in string-ified JSON or base64 format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#template IdentityOidcRole#template} --- @@ -1047,7 +1047,7 @@ public readonly ttl: number; TTL of the tokens generated against the role in number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_role#ttl IdentityOidcRole#ttl} --- diff --git a/docs/identityOidcScope.csharp.md b/docs/identityOidcScope.csharp.md index 690a63e0..e5e5190d 100644 --- a/docs/identityOidcScope.csharp.md +++ b/docs/identityOidcScope.csharp.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new IdentityOidcScopeConfig { | Provisioners | object[] | *No description.* | | Name | string | The name of the scope. The openid scope name is reserved. | | Description | string | The scope's description. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Template | string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -922,7 +922,7 @@ public string Name { get; set; } The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -936,7 +936,7 @@ public string Description { get; set; } The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -979,7 +979,7 @@ public string Template { get; set; } The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.go.md b/docs/identityOidcScope.go.md index dc3949f8..9f35c370 100644 --- a/docs/identityOidcScope.go.md +++ b/docs/identityOidcScope.go.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/identityoidcscope" | Provisioners | *[]interface{} | *No description.* | | Name | *string | The name of the scope. The openid scope name is reserved. | | Description | *string | The scope's description. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Template | *string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -922,7 +922,7 @@ Name *string The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -936,7 +936,7 @@ Description *string The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -979,7 +979,7 @@ Template *string The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.java.md b/docs/identityOidcScope.java.md index 2b09c501..b3d770e2 100644 --- a/docs/identityOidcScope.java.md +++ b/docs/identityOidcScope.java.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -44,7 +44,7 @@ IdentityOidcScope.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the scope. The openid scope name is reserved. | | description | java.lang.String | The scope's description. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ IdentityOidcScopeConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | The name of the scope. The openid scope name is reserved. | | description | java.lang.String | The scope's description. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | template | java.lang.String | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -1043,7 +1043,7 @@ public java.lang.String getName(); The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -1057,7 +1057,7 @@ public java.lang.String getDescription(); The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -1100,7 +1100,7 @@ public java.lang.String getTemplate(); The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.python.md b/docs/identityOidcScope.python.md index 9852d236..c504a751 100644 --- a/docs/identityOidcScope.python.md +++ b/docs/identityOidcScope.python.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -42,7 +42,7 @@ identityOidcScope.IdentityOidcScope( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the scope. The openid scope name is reserved. | | description | str | The scope's description. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ identityOidcScope.IdentityOidcScopeConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | The name of the scope. The openid scope name is reserved. | | description | str | The scope's description. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | | template | str | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -1083,7 +1083,7 @@ name: str The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -1097,7 +1097,7 @@ description: str The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -1140,7 +1140,7 @@ template: str The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/identityOidcScope.typescript.md b/docs/identityOidcScope.typescript.md index 12f4687b..554f679f 100644 --- a/docs/identityOidcScope.typescript.md +++ b/docs/identityOidcScope.typescript.md @@ -4,7 +4,7 @@ ### IdentityOidcScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope vault_identity_oidc_scope}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the IdentityOidcScope to impor The id of the existing IdentityOidcScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const identityOidcScopeConfig: identityOidcScope.IdentityOidcScopeConfig = { ... | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | The name of the scope. The openid scope name is reserved. | | description | string | The scope's description. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. | | namespace | string | Target namespace. (requires Enterprise). | | template | string | The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. | @@ -909,7 +909,7 @@ public readonly name: string; The name of the scope. The openid scope name is reserved. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#name IdentityOidcScope#name} --- @@ -923,7 +923,7 @@ public readonly description: string; The scope's description. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#description IdentityOidcScope#description} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#id IdentityOidcScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#namespace IdentityOidcScope#namespace} --- @@ -966,7 +966,7 @@ public readonly template: string; The template string for the scope. This may be provided as escaped JSON or base64 encoded JSON. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/identity_oidc_scope#template IdentityOidcScope#template} --- diff --git a/docs/jwtAuthBackend.csharp.md b/docs/jwtAuthBackend.csharp.md index 910611e0..50c82ad9 100644 --- a/docs/jwtAuthBackend.csharp.md +++ b/docs/jwtAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1379,7 +1379,7 @@ new JwtAuthBackendConfig { | DefaultRole | string | The default role to use if none is provided during login. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | JwksCaPem | string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | JwksUrl | string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | JwtSupportedAlgs | string[] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1395,7 +1395,7 @@ new JwtAuthBackendConfig { | OidcResponseTypes | string[] | The response types to request. | | Path | string | path to mount the backend. | | ProviderConfig | System.Collections.Generic.IDictionary | Provider specific handling configuration. | -| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| Tune | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | Type | string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1480,7 +1480,7 @@ public string BoundIssuer { get; set; } The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1494,7 +1494,7 @@ public string DefaultRole { get; set; } The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1508,7 +1508,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1522,7 +1522,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1534,7 +1534,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1553,7 +1553,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1567,7 +1567,7 @@ public string JwksUrl { get; set; } JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1581,7 +1581,7 @@ public string[] JwtSupportedAlgs { get; set; } A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1597,7 +1597,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1611,7 +1611,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1625,7 +1625,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1641,7 +1641,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1655,7 +1655,7 @@ public string OidcClientId { get; set; } Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1669,7 +1669,7 @@ public string OidcClientSecret { get; set; } Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1685,7 +1685,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1699,7 +1699,7 @@ public string OidcDiscoveryUrl { get; set; } The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1715,7 +1715,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1731,7 +1731,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1745,7 +1745,7 @@ public string Path { get; set; } path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1759,7 +1759,7 @@ public System.Collections.Generic.IDictionary ProviderConfig { g Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1771,7 +1771,7 @@ public object Tune { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1785,7 +1785,7 @@ public string Type { get; set; } Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1812,14 +1812,14 @@ new JwtAuthBackendTune { | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| AllowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| ListingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| MaxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| TokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1831,7 +1831,7 @@ public string[] AllowedResponseHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1843,7 +1843,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1855,7 +1855,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1867,7 +1867,7 @@ public string DefaultLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1879,7 +1879,7 @@ public string ListingVisibility { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1891,7 +1891,7 @@ public string MaxLeaseTtl { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1903,7 +1903,7 @@ public string[] PassthroughRequestHeaders { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1915,7 +1915,7 @@ public string TokenType { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.go.md b/docs/jwtAuthBackend.go.md index 61bd1dfc..694cf90f 100644 --- a/docs/jwtAuthBackend.go.md +++ b/docs/jwtAuthBackend.go.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1379,7 +1379,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" | DefaultRole | *string | The default role to use if none is provided during login. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | JwksCaPem | *string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | JwksUrl | *string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | JwtSupportedAlgs | *[]*string | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1395,7 +1395,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" | OidcResponseTypes | *[]*string | The response types to request. | | Path | *string | path to mount the backend. | | ProviderConfig | *map[string]*string | Provider specific handling configuration. | -| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| Tune | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | Type | *string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1480,7 +1480,7 @@ BoundIssuer *string The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1494,7 +1494,7 @@ DefaultRole *string The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1508,7 +1508,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1522,7 +1522,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1534,7 +1534,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1553,7 +1553,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1567,7 +1567,7 @@ JwksUrl *string JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1581,7 +1581,7 @@ JwtSupportedAlgs *[]*string A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1597,7 +1597,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1611,7 +1611,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1625,7 +1625,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1641,7 +1641,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1655,7 +1655,7 @@ OidcClientId *string Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1669,7 +1669,7 @@ OidcClientSecret *string Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1685,7 +1685,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1699,7 +1699,7 @@ OidcDiscoveryUrl *string The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1715,7 +1715,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1731,7 +1731,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1745,7 +1745,7 @@ Path *string path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1759,7 +1759,7 @@ ProviderConfig *map[string]*string Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1771,7 +1771,7 @@ Tune interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1785,7 +1785,7 @@ Type *string Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1812,14 +1812,14 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| AllowedResponseHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| AuditNonHmacRequestKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| AuditNonHmacResponseKeys | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| DefaultLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| ListingVisibility | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| MaxLeaseTtl | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| PassthroughRequestHeaders | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| TokenType | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1831,7 +1831,7 @@ AllowedResponseHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1843,7 +1843,7 @@ AuditNonHmacRequestKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1855,7 +1855,7 @@ AuditNonHmacResponseKeys *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1867,7 +1867,7 @@ DefaultLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1879,7 +1879,7 @@ ListingVisibility *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1891,7 +1891,7 @@ MaxLeaseTtl *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1903,7 +1903,7 @@ PassthroughRequestHeaders *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1915,7 +1915,7 @@ TokenType *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.java.md b/docs/jwtAuthBackend.java.md index 22d960f9..b058c50e 100644 --- a/docs/jwtAuthBackend.java.md +++ b/docs/jwtAuthBackend.java.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -67,7 +67,7 @@ JwtAuthBackend.Builder.create(Construct scope, java.lang.String id) | defaultRole | java.lang.String | The default role to use if none is provided during login. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | java.lang.String | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | java.lang.String | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | java.util.List | A list of supported signing algorithms. Defaults to [RS256]. | @@ -83,7 +83,7 @@ JwtAuthBackend.Builder.create(Construct scope, java.lang.String id) | oidcResponseTypes | java.util.List | The response types to request. | | path | java.lang.String | path to mount the backend. | | providerConfig | java.util.Map | Provider specific handling configuration. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | java.lang.String | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -154,7 +154,7 @@ Must be unique amongst siblings in the same scope The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -207,7 +207,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -217,7 +217,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -227,7 +227,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -239,7 +239,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -271,7 +271,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -303,7 +303,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -325,7 +325,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -337,7 +337,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -969,7 +969,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1722,7 +1722,7 @@ JwtAuthBackendConfig.builder() | defaultRole | java.lang.String | The default role to use if none is provided during login. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | java.lang.String | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | java.lang.String | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | java.util.List | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1738,7 +1738,7 @@ JwtAuthBackendConfig.builder() | oidcResponseTypes | java.util.List | The response types to request. | | path | java.lang.String | path to mount the backend. | | providerConfig | java.util.Map | Provider specific handling configuration. | -| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | java.lang.String | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1823,7 +1823,7 @@ public java.lang.String getBoundIssuer(); The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1837,7 +1837,7 @@ public java.lang.String getDefaultRole(); The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1851,7 +1851,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1865,7 +1865,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1877,7 +1877,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1896,7 +1896,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1910,7 +1910,7 @@ public java.lang.String getJwksUrl(); JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1924,7 +1924,7 @@ public java.util.List getJwtSupportedAlgs(); A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1940,7 +1940,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1954,7 +1954,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1968,7 +1968,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1984,7 +1984,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1998,7 +1998,7 @@ public java.lang.String getOidcClientId(); Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -2012,7 +2012,7 @@ public java.lang.String getOidcClientSecret(); Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -2028,7 +2028,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -2042,7 +2042,7 @@ public java.lang.String getOidcDiscoveryUrl(); The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -2058,7 +2058,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -2074,7 +2074,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -2088,7 +2088,7 @@ public java.lang.String getPath(); path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -2102,7 +2102,7 @@ public java.util.Map getProviderConfig(); Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -2114,7 +2114,7 @@ public java.lang.Object getTune(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<JwtAuthBackendTune> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -2128,7 +2128,7 @@ public java.lang.String getType(); Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -2155,14 +2155,14 @@ JwtAuthBackendTune.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowedResponseHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listingVisibility | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| maxLeaseTtl | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| tokenType | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -2174,7 +2174,7 @@ public java.util.List getAllowedResponseHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -2186,7 +2186,7 @@ public java.util.List getAuditNonHmacRequestKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -2198,7 +2198,7 @@ public java.util.List getAuditNonHmacResponseKeys(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -2210,7 +2210,7 @@ public java.lang.String getDefaultLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -2222,7 +2222,7 @@ public java.lang.String getListingVisibility(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -2234,7 +2234,7 @@ public java.lang.String getMaxLeaseTtl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -2246,7 +2246,7 @@ public java.util.List getPassthroughRequestHeaders(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -2258,7 +2258,7 @@ public java.lang.String getTokenType(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.python.md b/docs/jwtAuthBackend.python.md index 98270a82..18f25eb3 100644 --- a/docs/jwtAuthBackend.python.md +++ b/docs/jwtAuthBackend.python.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -61,7 +61,7 @@ jwtAuthBackend.JwtAuthBackend( | default_role | str | The default role to use if none is provided during login. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwks_ca_pem | str | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwks_url | str | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwt_supported_algs | typing.List[str] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -77,7 +77,7 @@ jwtAuthBackend.JwtAuthBackend( | oidc_response_types | typing.List[str] | The response types to request. | | path | str | path to mount the backend. | | provider_config | typing.Mapping[str] | Provider specific handling configuration. | -| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | str | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -201,7 +201,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -233,7 +233,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -265,7 +265,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -297,7 +297,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -307,7 +307,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -319,7 +319,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -331,7 +331,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -341,7 +341,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -351,7 +351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1011,7 +1011,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1756,7 +1756,7 @@ jwtAuthBackend.JwtAuthBackendConfig( | default_role | str | The default role to use if none is provided during login. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwks_ca_pem | str | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwks_url | str | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwt_supported_algs | typing.List[str] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1772,7 +1772,7 @@ jwtAuthBackend.JwtAuthBackendConfig( | oidc_response_types | typing.List[str] | The response types to request. | | path | str | path to mount the backend. | | provider_config | typing.Mapping[str] | Provider specific handling configuration. | -| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | str | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1857,7 +1857,7 @@ bound_issuer: str The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1871,7 +1871,7 @@ default_role: str The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1885,7 +1885,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1899,7 +1899,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1911,7 +1911,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1930,7 +1930,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1944,7 +1944,7 @@ jwks_url: str JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1958,7 +1958,7 @@ jwt_supported_algs: typing.List[str] A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1974,7 +1974,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1988,7 +1988,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -2002,7 +2002,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -2018,7 +2018,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -2032,7 +2032,7 @@ oidc_client_id: str Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -2046,7 +2046,7 @@ oidc_client_secret: str Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -2062,7 +2062,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -2076,7 +2076,7 @@ oidc_discovery_url: str The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -2092,7 +2092,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -2108,7 +2108,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -2122,7 +2122,7 @@ path: str path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -2136,7 +2136,7 @@ provider_config: typing.Mapping[str] Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -2148,7 +2148,7 @@ tune: typing.Union[IResolvable, typing.List[JwtAuthBackendTune]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[JwtAuthBackendTune]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -2162,7 +2162,7 @@ type: str Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -2189,14 +2189,14 @@ jwtAuthBackend.JwtAuthBackendTune( | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowed_response_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| audit_non_hmac_request_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| audit_non_hmac_response_keys | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| default_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listing_visibility | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| max_lease_ttl | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthrough_request_headers | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| token_type | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -2208,7 +2208,7 @@ allowed_response_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -2220,7 +2220,7 @@ audit_non_hmac_request_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -2232,7 +2232,7 @@ audit_non_hmac_response_keys: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -2244,7 +2244,7 @@ default_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -2256,7 +2256,7 @@ listing_visibility: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -2268,7 +2268,7 @@ max_lease_ttl: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -2280,7 +2280,7 @@ passthrough_request_headers: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -2292,7 +2292,7 @@ token_type: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackend.typescript.md b/docs/jwtAuthBackend.typescript.md index 48ab42a8..c5c429dd 100644 --- a/docs/jwtAuthBackend.typescript.md +++ b/docs/jwtAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### JwtAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend vault_jwt_auth_backend}. #### Initializers @@ -634,7 +634,7 @@ The construct id used in the generated config for the JwtAuthBackend to import. The id of the existing JwtAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1349,7 +1349,7 @@ const jwtAuthBackendConfig: jwtAuthBackend.JwtAuthBackendConfig = { ... } | defaultRole | string | The default role to use if none is provided during login. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. | | jwksCaPem | string | The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. | | jwksUrl | string | JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. | | jwtSupportedAlgs | string[] | A list of supported signing algorithms. Defaults to [RS256]. | @@ -1365,7 +1365,7 @@ const jwtAuthBackendConfig: jwtAuthBackend.JwtAuthBackendConfig = { ... } | oidcResponseTypes | string[] | The response types to request. | | path | string | path to mount the backend. | | providerConfig | {[ key: string ]: string} | Provider specific handling configuration. | -| tune | cdktf.IResolvable \| JwtAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | +| tune | cdktf.IResolvable \| JwtAuthBackendTune[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. | | type | string | Type of backend. Can be either 'jwt' or 'oidc'. | --- @@ -1450,7 +1450,7 @@ public readonly boundIssuer: string; The value against which to match the iss claim in a JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#bound_issuer JwtAuthBackend#bound_issuer} --- @@ -1464,7 +1464,7 @@ public readonly defaultRole: string; The default role to use if none is provided during login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_role JwtAuthBackend#default_role} --- @@ -1478,7 +1478,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#description JwtAuthBackend#description} --- @@ -1492,7 +1492,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#disable_remount JwtAuthBackend#disable_remount} --- @@ -1504,7 +1504,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#id JwtAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1523,7 +1523,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_ca_pem JwtAuthBackend#jwks_ca_pem} --- @@ -1537,7 +1537,7 @@ public readonly jwksUrl: string; JWKS URL to use to authenticate signatures. Cannot be used with 'oidc_discovery_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwks_url JwtAuthBackend#jwks_url} --- @@ -1551,7 +1551,7 @@ public readonly jwtSupportedAlgs: string[]; A list of supported signing algorithms. Defaults to [RS256]. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_supported_algs JwtAuthBackend#jwt_supported_algs} --- @@ -1567,7 +1567,7 @@ A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used with 'jwks_url' or 'oidc_discovery_url'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#jwt_validation_pubkeys JwtAuthBackend#jwt_validation_pubkeys} --- @@ -1581,7 +1581,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#local JwtAuthBackend#local} --- @@ -1595,7 +1595,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace JwtAuthBackend#namespace} --- @@ -1611,7 +1611,7 @@ Pass namespace in the OIDC state parameter instead of as a separate query parame With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#namespace_in_state JwtAuthBackend#namespace_in_state} --- @@ -1625,7 +1625,7 @@ public readonly oidcClientId: string; Client ID used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_id JwtAuthBackend#oidc_client_id} --- @@ -1639,7 +1639,7 @@ public readonly oidcClientSecret: string; Client Secret used for OIDC. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_client_secret JwtAuthBackend#oidc_client_secret} --- @@ -1655,7 +1655,7 @@ The CA certificate or chain of certificates, in PEM format, to use to validate c If not set, system certificates are used -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_ca_pem JwtAuthBackend#oidc_discovery_ca_pem} --- @@ -1669,7 +1669,7 @@ public readonly oidcDiscoveryUrl: string; The OIDC Discovery URL, without any .well-known component (base path). Cannot be used with 'jwks_url' or 'jwt_validation_pubkeys'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_discovery_url JwtAuthBackend#oidc_discovery_url} --- @@ -1685,7 +1685,7 @@ The response mode to be used in the OAuth2 request. Allowed values are 'query' and 'form_post'. Defaults to 'query'. If using Vault namespaces, and oidc_response_mode is 'form_post', then 'namespace_in_state' should be set to false. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_mode JwtAuthBackend#oidc_response_mode} --- @@ -1701,7 +1701,7 @@ The response types to request. Allowed values are 'code' and 'id_token'. Defaults to 'code'. Note: 'id_token' may only be used if 'oidc_response_mode' is set to 'form_post'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#oidc_response_types JwtAuthBackend#oidc_response_types} --- @@ -1715,7 +1715,7 @@ public readonly path: string; path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#path JwtAuthBackend#path} --- @@ -1729,7 +1729,7 @@ public readonly providerConfig: {[ key: string ]: string}; Provider specific handling configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#provider_config JwtAuthBackend#provider_config} --- @@ -1741,7 +1741,7 @@ public readonly tune: IResolvable | JwtAuthBackendTune[]; - *Type:* cdktf.IResolvable | JwtAuthBackendTune[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#tune JwtAuthBackend#tune}. --- @@ -1755,7 +1755,7 @@ public readonly type: string; Type of backend. Can be either 'jwt' or 'oidc'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#type JwtAuthBackend#type} --- @@ -1773,14 +1773,14 @@ const jwtAuthBackendTune: jwtAuthBackend.JwtAuthBackendTune = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | -| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | -| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | -| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | -| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | -| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | -| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | -| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | +| allowedResponseHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. | +| auditNonHmacRequestKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. | +| auditNonHmacResponseKeys | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. | +| defaultLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. | +| listingVisibility | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. | +| maxLeaseTtl | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. | +| passthroughRequestHeaders | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. | +| tokenType | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. | --- @@ -1792,7 +1792,7 @@ public readonly allowedResponseHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#allowed_response_headers JwtAuthBackend#allowed_response_headers}. --- @@ -1804,7 +1804,7 @@ public readonly auditNonHmacRequestKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_request_keys JwtAuthBackend#audit_non_hmac_request_keys}. --- @@ -1816,7 +1816,7 @@ public readonly auditNonHmacResponseKeys: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#audit_non_hmac_response_keys JwtAuthBackend#audit_non_hmac_response_keys}. --- @@ -1828,7 +1828,7 @@ public readonly defaultLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#default_lease_ttl JwtAuthBackend#default_lease_ttl}. --- @@ -1840,7 +1840,7 @@ public readonly listingVisibility: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#listing_visibility JwtAuthBackend#listing_visibility}. --- @@ -1852,7 +1852,7 @@ public readonly maxLeaseTtl: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#max_lease_ttl JwtAuthBackend#max_lease_ttl}. --- @@ -1864,7 +1864,7 @@ public readonly passthroughRequestHeaders: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#passthrough_request_headers JwtAuthBackend#passthrough_request_headers}. --- @@ -1876,7 +1876,7 @@ public readonly tokenType: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend#token_type JwtAuthBackend#token_type}. --- diff --git a/docs/jwtAuthBackendRole.csharp.md b/docs/jwtAuthBackendRole.csharp.md index 621590fe..d5684db4 100644 --- a/docs/jwtAuthBackendRole.csharp.md +++ b/docs/jwtAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1590,7 +1590,7 @@ new JwtAuthBackendRoleConfig { | DisableBoundClaimsParsing | object | Disable bound claim value parsing. Useful when values contain commas. | | ExpirationLeeway | double | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | GroupsClaim | string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | MaxAge | double | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | Namespace | string | Target namespace. (requires Enterprise). | | NotBeforeLeeway | double | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1690,7 +1690,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1706,7 +1706,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1720,7 +1720,7 @@ public string[] AllowedRedirectUris { get; set; } The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1734,7 +1734,7 @@ public string Backend { get; set; } Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1748,7 +1748,7 @@ public string[] BoundAudiences { get; set; } List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1762,7 +1762,7 @@ public System.Collections.Generic.IDictionary BoundClaims { get; Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1776,7 +1776,7 @@ public string BoundClaimsType { get; set; } How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1790,7 +1790,7 @@ public string BoundSubject { get; set; } If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1804,7 +1804,7 @@ public System.Collections.Generic.IDictionary ClaimMappings { ge Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1820,7 +1820,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1834,7 +1834,7 @@ public object DisableBoundClaimsParsing { get; set; } Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1850,7 +1850,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1866,7 +1866,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1878,7 +1878,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1895,7 +1895,7 @@ public double MaxAge { get; set; } Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1909,7 +1909,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1925,7 +1925,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1941,7 +1941,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1955,7 +1955,7 @@ public string RoleType { get; set; } Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1969,7 +1969,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1983,7 +1983,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1997,7 +1997,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2011,7 +2011,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2025,7 +2025,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2039,7 +2039,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2053,7 +2053,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2067,7 +2067,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2081,7 +2081,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2097,7 +2097,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2113,7 +2113,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.go.md b/docs/jwtAuthBackendRole.go.md index b27e5fa4..addabb13 100644 --- a/docs/jwtAuthBackendRole.go.md +++ b/docs/jwtAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1590,7 +1590,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/jwtauthbackendrole" | DisableBoundClaimsParsing | interface{} | Disable bound claim value parsing. Useful when values contain commas. | | ExpirationLeeway | *f64 | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | GroupsClaim | *string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | MaxAge | *f64 | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | Namespace | *string | Target namespace. (requires Enterprise). | | NotBeforeLeeway | *f64 | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1690,7 +1690,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1706,7 +1706,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1720,7 +1720,7 @@ AllowedRedirectUris *[]*string The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1734,7 +1734,7 @@ Backend *string Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1748,7 +1748,7 @@ BoundAudiences *[]*string List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1762,7 +1762,7 @@ BoundClaims *map[string]*string Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1776,7 +1776,7 @@ BoundClaimsType *string How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1790,7 +1790,7 @@ BoundSubject *string If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1804,7 +1804,7 @@ ClaimMappings *map[string]*string Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1820,7 +1820,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1834,7 +1834,7 @@ DisableBoundClaimsParsing interface{} Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1850,7 +1850,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1866,7 +1866,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1878,7 +1878,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1895,7 +1895,7 @@ MaxAge *f64 Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1909,7 +1909,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1925,7 +1925,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1941,7 +1941,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1955,7 +1955,7 @@ RoleType *string Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1969,7 +1969,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1983,7 +1983,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1997,7 +1997,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2011,7 +2011,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2025,7 +2025,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2039,7 +2039,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2053,7 +2053,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2067,7 +2067,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2081,7 +2081,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2097,7 +2097,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2113,7 +2113,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.java.md b/docs/jwtAuthBackendRole.java.md index 00d93382..30cc352f 100644 --- a/docs/jwtAuthBackendRole.java.md +++ b/docs/jwtAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -84,7 +84,7 @@ JwtAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | disableBoundClaimsParsing | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | java.lang.Number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | java.lang.String | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | java.lang.Number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeLeeway | java.lang.Number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -170,7 +170,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -182,7 +182,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -202,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -212,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -222,7 +222,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -232,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -252,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -264,7 +264,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -274,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -286,7 +286,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -298,7 +298,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -319,7 +319,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -341,7 +341,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -353,7 +353,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -373,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -383,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -393,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -403,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -413,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -423,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -433,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -443,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -453,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -465,7 +465,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -477,7 +477,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- @@ -1100,7 +1100,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2035,7 +2035,7 @@ JwtAuthBackendRoleConfig.builder() | disableBoundClaimsParsing | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | java.lang.Number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | java.lang.String | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | java.lang.Number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | notBeforeLeeway | java.lang.Number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -2135,7 +2135,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -2151,7 +2151,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -2165,7 +2165,7 @@ public java.util.List getAllowedRedirectUris(); The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -2179,7 +2179,7 @@ public java.lang.String getBackend(); Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -2193,7 +2193,7 @@ public java.util.List getBoundAudiences(); List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -2207,7 +2207,7 @@ public java.util.Map getBoundClaims(); Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -2221,7 +2221,7 @@ public java.lang.String getBoundClaimsType(); How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -2235,7 +2235,7 @@ public java.lang.String getBoundSubject(); If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -2249,7 +2249,7 @@ public java.util.Map getClaimMappings(); Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -2265,7 +2265,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -2279,7 +2279,7 @@ public java.lang.Object getDisableBoundClaimsParsing(); Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -2295,7 +2295,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -2311,7 +2311,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -2323,7 +2323,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2340,7 +2340,7 @@ public java.lang.Number getMaxAge(); Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -2354,7 +2354,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -2370,7 +2370,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -2386,7 +2386,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -2400,7 +2400,7 @@ public java.lang.String getRoleType(); Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -2414,7 +2414,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -2428,7 +2428,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -2442,7 +2442,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2456,7 +2456,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2470,7 +2470,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2484,7 +2484,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2498,7 +2498,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2512,7 +2512,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2526,7 +2526,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2542,7 +2542,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2558,7 +2558,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.python.md b/docs/jwtAuthBackendRole.python.md index 2ee7bf2d..4dc1f0bf 100644 --- a/docs/jwtAuthBackendRole.python.md +++ b/docs/jwtAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -78,7 +78,7 @@ jwtAuthBackendRole.JwtAuthBackendRole( | disable_bound_claims_parsing | typing.Union[bool, cdktf.IResolvable] | Disable bound claim value parsing. Useful when values contain commas. | | expiration_leeway | typing.Union[int, float] | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groups_claim | str | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | max_age | typing.Union[int, float] | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_leeway | typing.Union[int, float] | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -164,7 +164,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -176,7 +176,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -258,7 +258,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -280,7 +280,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -292,7 +292,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -313,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -335,7 +335,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -347,7 +347,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -367,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -377,7 +377,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -387,7 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -397,7 +397,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -407,7 +407,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -417,7 +417,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -427,7 +427,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -437,7 +437,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -447,7 +447,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -459,7 +459,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -471,7 +471,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- @@ -1140,7 +1140,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -2067,7 +2067,7 @@ jwtAuthBackendRole.JwtAuthBackendRoleConfig( | disable_bound_claims_parsing | typing.Union[bool, cdktf.IResolvable] | Disable bound claim value parsing. Useful when values contain commas. | | expiration_leeway | typing.Union[int, float] | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groups_claim | str | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | max_age | typing.Union[int, float] | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | str | Target namespace. (requires Enterprise). | | not_before_leeway | typing.Union[int, float] | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -2167,7 +2167,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -2183,7 +2183,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -2197,7 +2197,7 @@ allowed_redirect_uris: typing.List[str] The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -2211,7 +2211,7 @@ backend: str Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -2225,7 +2225,7 @@ bound_audiences: typing.List[str] List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -2239,7 +2239,7 @@ bound_claims: typing.Mapping[str] Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -2253,7 +2253,7 @@ bound_claims_type: str How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -2267,7 +2267,7 @@ bound_subject: str If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -2281,7 +2281,7 @@ claim_mappings: typing.Mapping[str] Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -2297,7 +2297,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -2311,7 +2311,7 @@ disable_bound_claims_parsing: typing.Union[bool, IResolvable] Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -2327,7 +2327,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -2343,7 +2343,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -2355,7 +2355,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2372,7 +2372,7 @@ max_age: typing.Union[int, float] Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -2386,7 +2386,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -2402,7 +2402,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -2418,7 +2418,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -2432,7 +2432,7 @@ role_type: str Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -2446,7 +2446,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -2460,7 +2460,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -2474,7 +2474,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -2488,7 +2488,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -2502,7 +2502,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2516,7 +2516,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2530,7 +2530,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2544,7 +2544,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2558,7 +2558,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2574,7 +2574,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2590,7 +2590,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/jwtAuthBackendRole.typescript.md b/docs/jwtAuthBackendRole.typescript.md index b32c340a..86a5f41f 100644 --- a/docs/jwtAuthBackendRole.typescript.md +++ b/docs/jwtAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### JwtAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role vault_jwt_auth_backend_role}. #### Initializers @@ -663,7 +663,7 @@ The construct id used in the generated config for the JwtAuthBackendRole to impo The id of the existing JwtAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1552,7 +1552,7 @@ const jwtAuthBackendRoleConfig: jwtAuthBackendRole.JwtAuthBackendRoleConfig = { | disableBoundClaimsParsing | boolean \| cdktf.IResolvable | Disable bound claim value parsing. Useful when values contain commas. | | expirationLeeway | number | The amount of leeway to add to expiration (exp) claims to account for clock skew, in seconds. | | groupsClaim | string | The claim to use to uniquely identify the set of groups to which the user belongs; | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. | | maxAge | number | Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. | | namespace | string | Target namespace. (requires Enterprise). | | notBeforeLeeway | number | The amount of leeway to add to not before (nbf) claims to account for clock skew, in seconds. | @@ -1652,7 +1652,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_name JwtAuthBackendRole#role_name} --- @@ -1668,7 +1668,7 @@ The claim to use to uniquely identify the user; this will be used as the name for the Identity entity alias created due to a successful login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim JwtAuthBackendRole#user_claim} --- @@ -1682,7 +1682,7 @@ public readonly allowedRedirectUris: string[]; The list of allowed values for redirect_uri during OIDC logins. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#allowed_redirect_uris JwtAuthBackendRole#allowed_redirect_uris} --- @@ -1696,7 +1696,7 @@ public readonly backend: string; Unique name of the auth backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#backend JwtAuthBackendRole#backend} --- @@ -1710,7 +1710,7 @@ public readonly boundAudiences: string[]; List of aud claims to match against. Any match is sufficient. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_audiences JwtAuthBackendRole#bound_audiences} --- @@ -1724,7 +1724,7 @@ public readonly boundClaims: {[ key: string ]: string}; Map of claims/values to match against. The expected value may be a single string or a comma-separated string list. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims JwtAuthBackendRole#bound_claims} --- @@ -1738,7 +1738,7 @@ public readonly boundClaimsType: string; How to interpret values in the claims/values map: can be either "string" (exact match) or "glob" (wildcard match). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_claims_type JwtAuthBackendRole#bound_claims_type} --- @@ -1752,7 +1752,7 @@ public readonly boundSubject: string; If set, requires that the sub claim matches this value. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#bound_subject JwtAuthBackendRole#bound_subject} --- @@ -1766,7 +1766,7 @@ public readonly claimMappings: {[ key: string ]: string}; Map of claims (keys) to be copied to specified metadata fields (values). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#claim_mappings JwtAuthBackendRole#claim_mappings} --- @@ -1782,7 +1782,7 @@ The amount of leeway to add to all claims to account for clock skew, in seconds. Defaults to 60 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#clock_skew_leeway JwtAuthBackendRole#clock_skew_leeway} --- @@ -1796,7 +1796,7 @@ public readonly disableBoundClaimsParsing: boolean | IResolvable; Disable bound claim value parsing. Useful when values contain commas. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#disable_bound_claims_parsing JwtAuthBackendRole#disable_bound_claims_parsing} --- @@ -1812,7 +1812,7 @@ The amount of leeway to add to expiration (exp) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#expiration_leeway JwtAuthBackendRole#expiration_leeway} --- @@ -1828,7 +1828,7 @@ The claim to use to uniquely identify the set of groups to which the user belong this will be used as the names for the Identity group aliases created due to a successful login. The claim value must be a list of strings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#groups_claim JwtAuthBackendRole#groups_claim} --- @@ -1840,7 +1840,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#id JwtAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1857,7 +1857,7 @@ public readonly maxAge: number; Specifies the allowable elapsed time in seconds since the last time the user was actively authenticated. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#max_age JwtAuthBackendRole#max_age} --- @@ -1871,7 +1871,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#namespace JwtAuthBackendRole#namespace} --- @@ -1887,7 +1887,7 @@ The amount of leeway to add to not before (nbf) claims to account for clock skew Defaults to 150 seconds if set to 0 and can be disabled if set to -1. Only applicable with 'jwt' roles. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#not_before_leeway JwtAuthBackendRole#not_before_leeway} --- @@ -1903,7 +1903,7 @@ List of OIDC scopes to be used with an OIDC role. The standard scope "openid" is automatically included and need not be specified. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#oidc_scopes JwtAuthBackendRole#oidc_scopes} --- @@ -1917,7 +1917,7 @@ public readonly roleType: string; Type of role, either "oidc" (default) or "jwt". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#role_type JwtAuthBackendRole#role_type} --- @@ -1931,7 +1931,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_bound_cidrs JwtAuthBackendRole#token_bound_cidrs} --- @@ -1945,7 +1945,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_explicit_max_ttl JwtAuthBackendRole#token_explicit_max_ttl} --- @@ -1959,7 +1959,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_max_ttl JwtAuthBackendRole#token_max_ttl} --- @@ -1973,7 +1973,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_no_default_policy JwtAuthBackendRole#token_no_default_policy} --- @@ -1987,7 +1987,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_num_uses JwtAuthBackendRole#token_num_uses} --- @@ -2001,7 +2001,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_period JwtAuthBackendRole#token_period} --- @@ -2015,7 +2015,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_policies JwtAuthBackendRole#token_policies} --- @@ -2029,7 +2029,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_ttl JwtAuthBackendRole#token_ttl} --- @@ -2043,7 +2043,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#token_type JwtAuthBackendRole#token_type} --- @@ -2059,7 +2059,7 @@ Specifies if the user_claim value uses JSON pointer syntax for referencing claim By default, the user_claim value will not use JSON pointer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#user_claim_json_pointer JwtAuthBackendRole#user_claim_json_pointer} --- @@ -2075,7 +2075,7 @@ Log received OIDC tokens and claims when debug-level logging is active. Not recommended in production since sensitive information may be present in OIDC responses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/jwt_auth_backend_role#verbose_oidc_logging JwtAuthBackendRole#verbose_oidc_logging} --- diff --git a/docs/kmipSecretBackend.csharp.md b/docs/kmipSecretBackend.csharp.md index 0cecf7b6..2ed95d3f 100644 --- a/docs/kmipSecretBackend.csharp.md +++ b/docs/kmipSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1110,7 +1110,7 @@ new KmipSecretBackendConfig { | DefaultTlsClientTtl | double | Client certificate TTL in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | ListenAddrs | string[] | Addresses the KMIP server should listen on (host:port). | | Namespace | string | Target namespace. (requires Enterprise). | | ServerHostnames | string[] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1201,7 +1201,7 @@ public string Path { get; set; } Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1215,7 +1215,7 @@ public double DefaultTlsClientKeyBits { get; set; } Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1229,7 +1229,7 @@ public string DefaultTlsClientKeyType { get; set; } Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1243,7 +1243,7 @@ public double DefaultTlsClientTtl { get; set; } Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1257,7 +1257,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1271,7 +1271,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1283,7 +1283,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1300,7 +1300,7 @@ public string[] ListenAddrs { get; set; } Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1314,7 +1314,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1330,7 +1330,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1344,7 +1344,7 @@ public string[] ServerIps { get; set; } IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1358,7 +1358,7 @@ public double TlsCaKeyBits { get; set; } CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1372,7 +1372,7 @@ public string TlsCaKeyType { get; set; } CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1386,7 +1386,7 @@ public string TlsMinVersion { get; set; } Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.go.md b/docs/kmipSecretBackend.go.md index 45a4cb94..fd9462e2 100644 --- a/docs/kmipSecretBackend.go.md +++ b/docs/kmipSecretBackend.go.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1110,7 +1110,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretbackend" | DefaultTlsClientTtl | *f64 | Client certificate TTL in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | ListenAddrs | *[]*string | Addresses the KMIP server should listen on (host:port). | | Namespace | *string | Target namespace. (requires Enterprise). | | ServerHostnames | *[]*string | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1201,7 +1201,7 @@ Path *string Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1215,7 +1215,7 @@ DefaultTlsClientKeyBits *f64 Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1229,7 +1229,7 @@ DefaultTlsClientKeyType *string Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1243,7 +1243,7 @@ DefaultTlsClientTtl *f64 Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1257,7 +1257,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1271,7 +1271,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1283,7 +1283,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1300,7 +1300,7 @@ ListenAddrs *[]*string Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1314,7 +1314,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1330,7 +1330,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1344,7 +1344,7 @@ ServerIps *[]*string IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1358,7 +1358,7 @@ TlsCaKeyBits *f64 CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1372,7 +1372,7 @@ TlsCaKeyType *string CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1386,7 +1386,7 @@ TlsMinVersion *string Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.java.md b/docs/kmipSecretBackend.java.md index b59d22ff..7b51f663 100644 --- a/docs/kmipSecretBackend.java.md +++ b/docs/kmipSecretBackend.java.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -58,7 +58,7 @@ KmipSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultTlsClientTtl | java.lang.Number | Client certificate TTL in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | java.util.List | Addresses the KMIP server should listen on (host:port). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | serverHostnames | java.util.List | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -135,7 +135,7 @@ Must be unique amongst siblings in the same scope Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -193,7 +193,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -206,7 +206,7 @@ If you experience problems setting this value it might not be settable. Please t Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -228,7 +228,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -238,7 +238,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -258,7 +258,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- @@ -786,7 +786,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1343,7 +1343,7 @@ KmipSecretBackendConfig.builder() | defaultTlsClientTtl | java.lang.Number | Client certificate TTL in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | java.util.List | Addresses the KMIP server should listen on (host:port). | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | serverHostnames | java.util.List | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1434,7 +1434,7 @@ public java.lang.String getPath(); Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1448,7 +1448,7 @@ public java.lang.Number getDefaultTlsClientKeyBits(); Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1462,7 +1462,7 @@ public java.lang.String getDefaultTlsClientKeyType(); Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1476,7 +1476,7 @@ public java.lang.Number getDefaultTlsClientTtl(); Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1490,7 +1490,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1504,7 +1504,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1516,7 +1516,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1533,7 +1533,7 @@ public java.util.List getListenAddrs(); Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1547,7 +1547,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1563,7 +1563,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1577,7 +1577,7 @@ public java.util.List getServerIps(); IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1591,7 +1591,7 @@ public java.lang.Number getTlsCaKeyBits(); CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1605,7 +1605,7 @@ public java.lang.String getTlsCaKeyType(); CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1619,7 +1619,7 @@ public java.lang.String getTlsMinVersion(); Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.python.md b/docs/kmipSecretBackend.python.md index 87e8f792..c23bbad7 100644 --- a/docs/kmipSecretBackend.python.md +++ b/docs/kmipSecretBackend.python.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -55,7 +55,7 @@ kmipSecretBackend.KmipSecretBackend( | default_tls_client_ttl | typing.Union[int, float] | Client certificate TTL in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listen_addrs | typing.List[str] | Addresses the KMIP server should listen on (host:port). | | namespace | str | Target namespace. (requires Enterprise). | | server_hostnames | typing.List[str] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -132,7 +132,7 @@ Must be unique amongst siblings in the same scope Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -152,7 +152,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -203,7 +203,7 @@ If you experience problems setting this value it might not be settable. Please t Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -225,7 +225,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- @@ -829,7 +829,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1381,7 +1381,7 @@ kmipSecretBackend.KmipSecretBackendConfig( | default_tls_client_ttl | typing.Union[int, float] | Client certificate TTL in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listen_addrs | typing.List[str] | Addresses the KMIP server should listen on (host:port). | | namespace | str | Target namespace. (requires Enterprise). | | server_hostnames | typing.List[str] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1472,7 +1472,7 @@ path: str Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1486,7 +1486,7 @@ default_tls_client_key_bits: typing.Union[int, float] Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1500,7 +1500,7 @@ default_tls_client_key_type: str Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1514,7 +1514,7 @@ default_tls_client_ttl: typing.Union[int, float] Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1528,7 +1528,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1542,7 +1542,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1554,7 +1554,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1571,7 +1571,7 @@ listen_addrs: typing.List[str] Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1585,7 +1585,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1601,7 +1601,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1615,7 +1615,7 @@ server_ips: typing.List[str] IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1629,7 +1629,7 @@ tls_ca_key_bits: typing.Union[int, float] CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1643,7 +1643,7 @@ tls_ca_key_type: str CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1657,7 +1657,7 @@ tls_min_version: str Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretBackend.typescript.md b/docs/kmipSecretBackend.typescript.md index c81cb2d3..97b398b9 100644 --- a/docs/kmipSecretBackend.typescript.md +++ b/docs/kmipSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend vault_kmip_secret_backend}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KmipSecretBackend to impor The id of the existing KmipSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1088,7 +1088,7 @@ const kmipSecretBackendConfig: kmipSecretBackend.KmipSecretBackendConfig = { ... | defaultTlsClientTtl | number | Client certificate TTL in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. | | listenAddrs | string[] | Addresses the KMIP server should listen on (host:port). | | namespace | string | Target namespace. (requires Enterprise). | | serverHostnames | string[] | Hostnames to include in the server's TLS certificate as SAN DNS names. | @@ -1179,7 +1179,7 @@ public readonly path: string; Path where KMIP secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#path KmipSecretBackend#path} --- @@ -1193,7 +1193,7 @@ public readonly defaultTlsClientKeyBits: number; Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_bits KmipSecretBackend#default_tls_client_key_bits} --- @@ -1207,7 +1207,7 @@ public readonly defaultTlsClientKeyType: string; Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_key_type KmipSecretBackend#default_tls_client_key_type} --- @@ -1221,7 +1221,7 @@ public readonly defaultTlsClientTtl: number; Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#default_tls_client_ttl KmipSecretBackend#default_tls_client_ttl} --- @@ -1235,7 +1235,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#description KmipSecretBackend#description} --- @@ -1249,7 +1249,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#disable_remount KmipSecretBackend#disable_remount} --- @@ -1261,7 +1261,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#id KmipSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1278,7 +1278,7 @@ public readonly listenAddrs: string[]; Addresses the KMIP server should listen on (host:port). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#listen_addrs KmipSecretBackend#listen_addrs} --- @@ -1292,7 +1292,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#namespace KmipSecretBackend#namespace} --- @@ -1308,7 +1308,7 @@ Hostnames to include in the server's TLS certificate as SAN DNS names. The first will be used as the common name (CN) -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_hostnames KmipSecretBackend#server_hostnames} --- @@ -1322,7 +1322,7 @@ public readonly serverIps: string[]; IPs to include in the server's TLS certificate as SAN IP addresses. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#server_ips KmipSecretBackend#server_ips} --- @@ -1336,7 +1336,7 @@ public readonly tlsCaKeyBits: number; CA key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_bits KmipSecretBackend#tls_ca_key_bits} --- @@ -1350,7 +1350,7 @@ public readonly tlsCaKeyType: string; CA key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_ca_key_type KmipSecretBackend#tls_ca_key_type} --- @@ -1364,7 +1364,7 @@ public readonly tlsMinVersion: string; Minimum TLS version to accept. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_backend#tls_min_version KmipSecretBackend#tls_min_version} --- diff --git a/docs/kmipSecretRole.csharp.md b/docs/kmipSecretRole.csharp.md index 9bb2172f..54dbc135 100644 --- a/docs/kmipSecretRole.csharp.md +++ b/docs/kmipSecretRole.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1333,7 +1333,7 @@ new KmipSecretRoleConfig { | Path | string | Path where KMIP backend is mounted. | | Role | string | Name of the role. | | Scope | string | Name of the scope. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | OperationActivate | object | Grant permission to use the KMIP Activate operation. | | OperationAddAttribute | object | Grant permission to use the KMIP Add Attribute operation. | @@ -1435,7 +1435,7 @@ public string Path { get; set; } Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1449,7 +1449,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1463,7 +1463,7 @@ public string Scope { get; set; } Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1475,7 +1475,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1492,7 +1492,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1506,7 +1506,7 @@ public object OperationActivate { get; set; } Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1520,7 +1520,7 @@ public object OperationAddAttribute { get; set; } Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1534,7 +1534,7 @@ public object OperationAll { get; set; } Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1548,7 +1548,7 @@ public object OperationCreate { get; set; } Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1562,7 +1562,7 @@ public object OperationDestroy { get; set; } Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1576,7 +1576,7 @@ public object OperationDiscoverVersions { get; set; } Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1590,7 +1590,7 @@ public object OperationGet { get; set; } Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1604,7 +1604,7 @@ public object OperationGetAttributeList { get; set; } Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1618,7 +1618,7 @@ public object OperationGetAttributes { get; set; } Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1632,7 +1632,7 @@ public object OperationLocate { get; set; } Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1646,7 +1646,7 @@ public object OperationNone { get; set; } Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1660,7 +1660,7 @@ public object OperationRegister { get; set; } Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1674,7 +1674,7 @@ public object OperationRekey { get; set; } Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1688,7 +1688,7 @@ public object OperationRevoke { get; set; } Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1702,7 +1702,7 @@ public double TlsClientKeyBits { get; set; } Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1716,7 +1716,7 @@ public string TlsClientKeyType { get; set; } Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1730,7 +1730,7 @@ public double TlsClientTtl { get; set; } Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.go.md b/docs/kmipSecretRole.go.md index d4f1bc90..85d15574 100644 --- a/docs/kmipSecretRole.go.md +++ b/docs/kmipSecretRole.go.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1333,7 +1333,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretrole" | Path | *string | Path where KMIP backend is mounted. | | Role | *string | Name of the role. | | Scope | *string | Name of the scope. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | OperationActivate | interface{} | Grant permission to use the KMIP Activate operation. | | OperationAddAttribute | interface{} | Grant permission to use the KMIP Add Attribute operation. | @@ -1435,7 +1435,7 @@ Path *string Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1449,7 +1449,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1463,7 +1463,7 @@ Scope *string Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1475,7 +1475,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1492,7 +1492,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1506,7 +1506,7 @@ OperationActivate interface{} Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1520,7 +1520,7 @@ OperationAddAttribute interface{} Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1534,7 +1534,7 @@ OperationAll interface{} Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1548,7 +1548,7 @@ OperationCreate interface{} Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1562,7 +1562,7 @@ OperationDestroy interface{} Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1576,7 +1576,7 @@ OperationDiscoverVersions interface{} Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1590,7 +1590,7 @@ OperationGet interface{} Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1604,7 +1604,7 @@ OperationGetAttributeList interface{} Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1618,7 +1618,7 @@ OperationGetAttributes interface{} Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1632,7 +1632,7 @@ OperationLocate interface{} Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1646,7 +1646,7 @@ OperationNone interface{} Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1660,7 +1660,7 @@ OperationRegister interface{} Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1674,7 +1674,7 @@ OperationRekey interface{} Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1688,7 +1688,7 @@ OperationRevoke interface{} Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1702,7 +1702,7 @@ TlsClientKeyBits *f64 Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1716,7 +1716,7 @@ TlsClientKeyType *string Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1730,7 +1730,7 @@ TlsClientTtl *f64 Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.java.md b/docs/kmipSecretRole.java.md index 9cc25ee0..5edc7c7b 100644 --- a/docs/kmipSecretRole.java.md +++ b/docs/kmipSecretRole.java.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -76,7 +76,7 @@ KmipSecretRole.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path where KMIP backend is mounted. | | role | java.lang.String | Name of the role. | | scope | java.lang.String | Name of the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | operationActivate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -164,7 +164,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -205,7 +205,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -345,7 +345,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -355,7 +355,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -365,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -375,7 +375,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- @@ -935,7 +935,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1686,7 +1686,7 @@ KmipSecretRoleConfig.builder() | path | java.lang.String | Path where KMIP backend is mounted. | | role | java.lang.String | Name of the role. | | scope | java.lang.String | Name of the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | operationActivate | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -1788,7 +1788,7 @@ public java.lang.String getPath(); Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1802,7 +1802,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1816,7 +1816,7 @@ public java.lang.String getScope(); Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1828,7 +1828,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1845,7 +1845,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1859,7 +1859,7 @@ public java.lang.Object getOperationActivate(); Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1873,7 +1873,7 @@ public java.lang.Object getOperationAddAttribute(); Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1887,7 +1887,7 @@ public java.lang.Object getOperationAll(); Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1901,7 +1901,7 @@ public java.lang.Object getOperationCreate(); Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1915,7 +1915,7 @@ public java.lang.Object getOperationDestroy(); Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1929,7 +1929,7 @@ public java.lang.Object getOperationDiscoverVersions(); Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1943,7 +1943,7 @@ public java.lang.Object getOperationGet(); Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1957,7 +1957,7 @@ public java.lang.Object getOperationGetAttributeList(); Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1971,7 +1971,7 @@ public java.lang.Object getOperationGetAttributes(); Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1985,7 +1985,7 @@ public java.lang.Object getOperationLocate(); Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1999,7 +1999,7 @@ public java.lang.Object getOperationNone(); Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -2013,7 +2013,7 @@ public java.lang.Object getOperationRegister(); Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -2027,7 +2027,7 @@ public java.lang.Object getOperationRekey(); Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -2041,7 +2041,7 @@ public java.lang.Object getOperationRevoke(); Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -2055,7 +2055,7 @@ public java.lang.Number getTlsClientKeyBits(); Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -2069,7 +2069,7 @@ public java.lang.String getTlsClientKeyType(); Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -2083,7 +2083,7 @@ public java.lang.Number getTlsClientTtl(); Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.python.md b/docs/kmipSecretRole.python.md index 3e5f8023..845cb12b 100644 --- a/docs/kmipSecretRole.python.md +++ b/docs/kmipSecretRole.python.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -60,7 +60,7 @@ kmipSecretRole.KmipSecretRole( | path | str | Path where KMIP backend is mounted. | | role | str | Name of the role. | | scope | str | Name of the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | operation_activate | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Activate operation. | | operation_add_attribute | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Add Attribute operation. | @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -189,7 +189,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -249,7 +249,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -259,7 +259,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -269,7 +269,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- @@ -965,7 +965,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1698,7 +1698,7 @@ kmipSecretRole.KmipSecretRoleConfig( | path | str | Path where KMIP backend is mounted. | | role | str | Name of the role. | | scope | str | Name of the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | operation_activate | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Activate operation. | | operation_add_attribute | typing.Union[bool, cdktf.IResolvable] | Grant permission to use the KMIP Add Attribute operation. | @@ -1800,7 +1800,7 @@ path: str Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1814,7 +1814,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1828,7 +1828,7 @@ scope: str Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1840,7 +1840,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1857,7 +1857,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1871,7 +1871,7 @@ operation_activate: typing.Union[bool, IResolvable] Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1885,7 +1885,7 @@ operation_add_attribute: typing.Union[bool, IResolvable] Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1899,7 +1899,7 @@ operation_all: typing.Union[bool, IResolvable] Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1913,7 +1913,7 @@ operation_create: typing.Union[bool, IResolvable] Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1927,7 +1927,7 @@ operation_destroy: typing.Union[bool, IResolvable] Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1941,7 +1941,7 @@ operation_discover_versions: typing.Union[bool, IResolvable] Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1955,7 +1955,7 @@ operation_get: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1969,7 +1969,7 @@ operation_get_attribute_list: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1983,7 +1983,7 @@ operation_get_attributes: typing.Union[bool, IResolvable] Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1997,7 +1997,7 @@ operation_locate: typing.Union[bool, IResolvable] Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -2011,7 +2011,7 @@ operation_none: typing.Union[bool, IResolvable] Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -2025,7 +2025,7 @@ operation_register: typing.Union[bool, IResolvable] Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -2039,7 +2039,7 @@ operation_rekey: typing.Union[bool, IResolvable] Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -2053,7 +2053,7 @@ operation_revoke: typing.Union[bool, IResolvable] Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -2067,7 +2067,7 @@ tls_client_key_bits: typing.Union[int, float] Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -2081,7 +2081,7 @@ tls_client_key_type: str Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -2095,7 +2095,7 @@ tls_client_ttl: typing.Union[int, float] Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretRole.typescript.md b/docs/kmipSecretRole.typescript.md index 9ea4288e..611a8568 100644 --- a/docs/kmipSecretRole.typescript.md +++ b/docs/kmipSecretRole.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role vault_kmip_secret_role}. #### Initializers @@ -600,7 +600,7 @@ The construct id used in the generated config for the KmipSecretRole to import. The id of the existing KmipSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1303,7 +1303,7 @@ const kmipSecretRoleConfig: kmipSecretRole.KmipSecretRoleConfig = { ... } | path | string | Path where KMIP backend is mounted. | | role | string | Name of the role. | | scope | string | Name of the scope. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | operationActivate | boolean \| cdktf.IResolvable | Grant permission to use the KMIP Activate operation. | | operationAddAttribute | boolean \| cdktf.IResolvable | Grant permission to use the KMIP Add Attribute operation. | @@ -1405,7 +1405,7 @@ public readonly path: string; Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#path KmipSecretRole#path} --- @@ -1419,7 +1419,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#role KmipSecretRole#role} --- @@ -1433,7 +1433,7 @@ public readonly scope: string; Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#scope KmipSecretRole#scope} --- @@ -1445,7 +1445,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#id KmipSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1462,7 +1462,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#namespace KmipSecretRole#namespace} --- @@ -1476,7 +1476,7 @@ public readonly operationActivate: boolean | IResolvable; Grant permission to use the KMIP Activate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_activate KmipSecretRole#operation_activate} --- @@ -1490,7 +1490,7 @@ public readonly operationAddAttribute: boolean | IResolvable; Grant permission to use the KMIP Add Attribute operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_add_attribute KmipSecretRole#operation_add_attribute} --- @@ -1504,7 +1504,7 @@ public readonly operationAll: boolean | IResolvable; Grant all permissions to this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_all KmipSecretRole#operation_all} --- @@ -1518,7 +1518,7 @@ public readonly operationCreate: boolean | IResolvable; Grant permission to use the KMIP Create operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_create KmipSecretRole#operation_create} --- @@ -1532,7 +1532,7 @@ public readonly operationDestroy: boolean | IResolvable; Grant permission to use the KMIP Destroy operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_destroy KmipSecretRole#operation_destroy} --- @@ -1546,7 +1546,7 @@ public readonly operationDiscoverVersions: boolean | IResolvable; Grant permission to use the KMIP Discover Version operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_discover_versions KmipSecretRole#operation_discover_versions} --- @@ -1560,7 +1560,7 @@ public readonly operationGet: boolean | IResolvable; Grant permission to use the KMIP Get operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get KmipSecretRole#operation_get} --- @@ -1574,7 +1574,7 @@ public readonly operationGetAttributeList: boolean | IResolvable; Grant permission to use the KMIP Get Attribute List operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attribute_list KmipSecretRole#operation_get_attribute_list} --- @@ -1588,7 +1588,7 @@ public readonly operationGetAttributes: boolean | IResolvable; Grant permission to use the KMIP Get Attributes operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_get_attributes KmipSecretRole#operation_get_attributes} --- @@ -1602,7 +1602,7 @@ public readonly operationLocate: boolean | IResolvable; Grant permission to use the KMIP Locate operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_locate KmipSecretRole#operation_locate} --- @@ -1616,7 +1616,7 @@ public readonly operationNone: boolean | IResolvable; Remove all permissions from this role. May not be specified with any other operation_* params. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_none KmipSecretRole#operation_none} --- @@ -1630,7 +1630,7 @@ public readonly operationRegister: boolean | IResolvable; Grant permission to use the KMIP Register operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_register KmipSecretRole#operation_register} --- @@ -1644,7 +1644,7 @@ public readonly operationRekey: boolean | IResolvable; Grant permission to use the KMIP Rekey operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_rekey KmipSecretRole#operation_rekey} --- @@ -1658,7 +1658,7 @@ public readonly operationRevoke: boolean | IResolvable; Grant permission to use the KMIP Revoke operation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#operation_revoke KmipSecretRole#operation_revoke} --- @@ -1672,7 +1672,7 @@ public readonly tlsClientKeyBits: number; Client certificate key bits, valid values depend on key type. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_bits KmipSecretRole#tls_client_key_bits} --- @@ -1686,7 +1686,7 @@ public readonly tlsClientKeyType: string; Client certificate key type, rsa or ec. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_key_type KmipSecretRole#tls_client_key_type} --- @@ -1700,7 +1700,7 @@ public readonly tlsClientTtl: number; Client certificate TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_role#tls_client_ttl KmipSecretRole#tls_client_ttl} --- diff --git a/docs/kmipSecretScope.csharp.md b/docs/kmipSecretScope.csharp.md index d45d1877..1ee266fa 100644 --- a/docs/kmipSecretScope.csharp.md +++ b/docs/kmipSecretScope.csharp.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ new KmipSecretScopeConfig { | Path | string | Path where KMIP backend is mounted. | | Scope | string | Name of the scope. | | Force | object | Force deletion even if there are managed objects in the scope. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ public string Path { get; set; } Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -929,7 +929,7 @@ public string Scope { get; set; } Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -943,7 +943,7 @@ public object Force { get; set; } Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -955,7 +955,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.go.md b/docs/kmipSecretScope.go.md index 578f07af..1c57e4a6 100644 --- a/docs/kmipSecretScope.go.md +++ b/docs/kmipSecretScope.go.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -830,7 +830,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kmipsecretscope" | Path | *string | Path where KMIP backend is mounted. | | Scope | *string | Name of the scope. | | Force | interface{} | Force deletion even if there are managed objects in the scope. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -915,7 +915,7 @@ Path *string Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -929,7 +929,7 @@ Scope *string Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -943,7 +943,7 @@ Force interface{} Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -955,7 +955,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -972,7 +972,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.java.md b/docs/kmipSecretScope.java.md index 2419baf2..d81e80c1 100644 --- a/docs/kmipSecretScope.java.md +++ b/docs/kmipSecretScope.java.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -46,7 +46,7 @@ KmipSecretScope.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path where KMIP backend is mounted. | | scope | java.lang.String | Name of the scope. | | force | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -117,7 +117,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -127,7 +127,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -145,7 +145,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -158,7 +158,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -953,7 +953,7 @@ KmipSecretScopeConfig.builder() | path | java.lang.String | Path where KMIP backend is mounted. | | scope | java.lang.String | Name of the scope. | | force | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1038,7 +1038,7 @@ public java.lang.String getPath(); Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -1052,7 +1052,7 @@ public java.lang.String getScope(); Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -1066,7 +1066,7 @@ public java.lang.Object getForce(); Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -1078,7 +1078,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1095,7 +1095,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.python.md b/docs/kmipSecretScope.python.md index 52e69073..115b27d3 100644 --- a/docs/kmipSecretScope.python.md +++ b/docs/kmipSecretScope.python.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -43,7 +43,7 @@ kmipSecretScope.KmipSecretScope( | path | str | Path where KMIP backend is mounted. | | scope | str | Name of the scope. | | force | typing.Union[bool, cdktf.IResolvable] | Force deletion even if there are managed objects in the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -991,7 +991,7 @@ kmipSecretScope.KmipSecretScopeConfig( | path | str | Path where KMIP backend is mounted. | | scope | str | Name of the scope. | | force | typing.Union[bool, cdktf.IResolvable] | Force deletion even if there are managed objects in the scope. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1076,7 +1076,7 @@ path: str Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -1090,7 +1090,7 @@ scope: str Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -1104,7 +1104,7 @@ force: typing.Union[bool, IResolvable] Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -1116,7 +1116,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1133,7 +1133,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kmipSecretScope.typescript.md b/docs/kmipSecretScope.typescript.md index 4958a431..7428752b 100644 --- a/docs/kmipSecretScope.typescript.md +++ b/docs/kmipSecretScope.typescript.md @@ -4,7 +4,7 @@ ### KmipSecretScope -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope vault_kmip_secret_scope}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the KmipSecretScope to import. The id of the existing KmipSecretScope that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#import import section} in the documentation of this resource for the id to use --- @@ -817,7 +817,7 @@ const kmipSecretScopeConfig: kmipSecretScope.KmipSecretScopeConfig = { ... } | path | string | Path where KMIP backend is mounted. | | scope | string | Name of the scope. | | force | boolean \| cdktf.IResolvable | Force deletion even if there are managed objects in the scope. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -902,7 +902,7 @@ public readonly path: string; Path where KMIP backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#path KmipSecretScope#path} --- @@ -916,7 +916,7 @@ public readonly scope: string; Name of the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#scope KmipSecretScope#scope} --- @@ -930,7 +930,7 @@ public readonly force: boolean | IResolvable; Force deletion even if there are managed objects in the scope. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#force KmipSecretScope#force} --- @@ -942,7 +942,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#id KmipSecretScope#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -959,7 +959,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kmip_secret_scope#namespace KmipSecretScope#namespace} --- diff --git a/docs/kubernetesAuthBackendConfig.csharp.md b/docs/kubernetesAuthBackendConfig.csharp.md index 67c68f1a..2681f6c4 100644 --- a/docs/kubernetesAuthBackendConfig.csharp.md +++ b/docs/kubernetesAuthBackendConfig.csharp.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -82,6 +82,7 @@ Must be unique amongst siblings in the same scope | ResetNamespace | *No description.* | | ResetPemKeys | *No description.* | | ResetTokenReviewerJwt | *No description.* | +| ResetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -427,6 +428,12 @@ private void ResetPemKeys() private void ResetTokenReviewerJwt() ``` +##### `ResetUseAnnotationsAsAliasMetadata` + +```csharp +private void ResetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -530,7 +537,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -570,6 +577,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | NamespaceInput | string | *No description.* | | PemKeysInput | string[] | *No description.* | | TokenReviewerJwtInput | string | *No description.* | +| UseAnnotationsAsAliasMetadataInput | object | *No description.* | | Backend | string | *No description.* | | DisableIssValidation | object | *No description.* | | DisableLocalCaJwt | object | *No description.* | @@ -580,6 +588,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Namespace | string | *No description.* | | PemKeys | string[] | *No description.* | | TokenReviewerJwt | string | *No description.* | +| UseAnnotationsAsAliasMetadata | object | *No description.* | --- @@ -825,6 +834,16 @@ public string TokenReviewerJwtInput { get; } --- +##### `UseAnnotationsAsAliasMetadataInput`Optional + +```csharp +public object UseAnnotationsAsAliasMetadataInput { get; } +``` + +- *Type:* object + +--- + ##### `Backend`Required ```csharp @@ -925,6 +944,16 @@ public string TokenReviewerJwt { get; } --- +##### `UseAnnotationsAsAliasMetadata`Required + +```csharp +public object UseAnnotationsAsAliasMetadata { get; } +``` + +- *Type:* object + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -969,7 +998,8 @@ new KubernetesAuthBackendConfigConfig { string KubernetesCaCert = null, string Namespace = null, string[] PemKeys = null, - string TokenReviewerJwt = null + string TokenReviewerJwt = null, + object UseAnnotationsAsAliasMetadata = null }; ``` @@ -988,12 +1018,13 @@ new KubernetesAuthBackendConfigConfig { | Backend | string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | object | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | object | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | Issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | Namespace | string | Target namespace. (requires Enterprise). | | PemKeys | string[] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | TokenReviewerJwt | string | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| UseAnnotationsAsAliasMetadata | object | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1077,7 +1108,7 @@ public string KubernetesHost { get; set; } Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1091,7 +1122,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1105,7 +1136,7 @@ public object DisableIssValidation { get; set; } Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1119,7 +1150,7 @@ public object DisableLocalCaJwt { get; set; } Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1131,7 +1162,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1148,7 +1179,7 @@ public string Issuer { get; set; } Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1162,7 +1193,7 @@ public string KubernetesCaCert { get; set; } PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1176,7 +1207,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1192,7 +1223,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1208,7 +1239,21 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `UseAnnotationsAsAliasMetadata`Optional + +```csharp +public object UseAnnotationsAsAliasMetadata { get; set; } +``` + +- *Type:* object + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/kubernetesAuthBackendConfig.go.md b/docs/kubernetesAuthBackendConfig.go.md index 8d52ccba..5be1688e 100644 --- a/docs/kubernetesAuthBackendConfig.go.md +++ b/docs/kubernetesAuthBackendConfig.go.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -82,6 +82,7 @@ Must be unique amongst siblings in the same scope | ResetNamespace | *No description.* | | ResetPemKeys | *No description.* | | ResetTokenReviewerJwt | *No description.* | +| ResetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -427,6 +428,12 @@ func ResetPemKeys() func ResetTokenReviewerJwt() ``` +##### `ResetUseAnnotationsAsAliasMetadata` + +```go +func ResetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -530,7 +537,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -570,6 +577,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | NamespaceInput | *string | *No description.* | | PemKeysInput | *[]*string | *No description.* | | TokenReviewerJwtInput | *string | *No description.* | +| UseAnnotationsAsAliasMetadataInput | interface{} | *No description.* | | Backend | *string | *No description.* | | DisableIssValidation | interface{} | *No description.* | | DisableLocalCaJwt | interface{} | *No description.* | @@ -580,6 +588,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Namespace | *string | *No description.* | | PemKeys | *[]*string | *No description.* | | TokenReviewerJwt | *string | *No description.* | +| UseAnnotationsAsAliasMetadata | interface{} | *No description.* | --- @@ -825,6 +834,16 @@ func TokenReviewerJwtInput() *string --- +##### `UseAnnotationsAsAliasMetadataInput`Optional + +```go +func UseAnnotationsAsAliasMetadataInput() interface{} +``` + +- *Type:* interface{} + +--- + ##### `Backend`Required ```go @@ -925,6 +944,16 @@ func TokenReviewerJwt() *string --- +##### `UseAnnotationsAsAliasMetadata`Required + +```go +func UseAnnotationsAsAliasMetadata() interface{} +``` + +- *Type:* interface{} + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -970,6 +999,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackend Namespace: *string, PemKeys: *[]*string, TokenReviewerJwt: *string, + UseAnnotationsAsAliasMetadata: interface{}, } ``` @@ -988,12 +1018,13 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackend | Backend | *string | Unique name of the kubernetes backend to configure. | | DisableIssValidation | interface{} | Optional disable JWT issuer validation. Allows to skip ISS validation. | | DisableLocalCaJwt | interface{} | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | Issuer | *string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | KubernetesCaCert | *string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | Namespace | *string | Target namespace. (requires Enterprise). | | PemKeys | *[]*string | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | TokenReviewerJwt | *string | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| UseAnnotationsAsAliasMetadata | interface{} | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1077,7 +1108,7 @@ KubernetesHost *string Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1091,7 +1122,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1105,7 +1136,7 @@ DisableIssValidation interface{} Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1119,7 +1150,7 @@ DisableLocalCaJwt interface{} Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1131,7 +1162,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1148,7 +1179,7 @@ Issuer *string Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1162,7 +1193,7 @@ KubernetesCaCert *string PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1176,7 +1207,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1192,7 +1223,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1208,7 +1239,21 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `UseAnnotationsAsAliasMetadata`Optional + +```go +UseAnnotationsAsAliasMetadata interface{} +``` + +- *Type:* interface{} + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/kubernetesAuthBackendConfig.java.md b/docs/kubernetesAuthBackendConfig.java.md index ab909804..6116e67d 100644 --- a/docs/kubernetesAuthBackendConfig.java.md +++ b/docs/kubernetesAuthBackendConfig.java.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -35,6 +35,8 @@ KubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.String id) // .namespace(java.lang.String) // .pemKeys(java.util.List) // .tokenReviewerJwt(java.lang.String) +// .useAnnotationsAsAliasMetadata(java.lang.Boolean) +// .useAnnotationsAsAliasMetadata(IResolvable) .build(); ``` @@ -53,12 +55,13 @@ KubernetesAuthBackendConfig.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pemKeys | java.util.List | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | tokenReviewerJwt | java.lang.String | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -128,7 +131,7 @@ Must be unique amongst siblings in the same scope Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -138,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -148,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -158,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -166,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +182,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -189,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -199,7 +202,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -211,7 +214,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -223,7 +226,17 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- @@ -263,6 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetNamespace | *No description.* | | resetPemKeys | *No description.* | | resetTokenReviewerJwt | *No description.* | +| resetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -610,6 +624,12 @@ public void resetPemKeys() public void resetTokenReviewerJwt() ``` +##### `resetUseAnnotationsAsAliasMetadata` + +```java +public void resetUseAnnotationsAsAliasMetadata() +``` + #### Static Functions | **Name** | **Description** | @@ -713,7 +733,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -753,6 +773,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespaceInput | java.lang.String | *No description.* | | pemKeysInput | java.util.List | *No description.* | | tokenReviewerJwtInput | java.lang.String | *No description.* | +| useAnnotationsAsAliasMetadataInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | backend | java.lang.String | *No description.* | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -763,6 +784,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespace | java.lang.String | *No description.* | | pemKeys | java.util.List | *No description.* | | tokenReviewerJwt | java.lang.String | *No description.* | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | --- @@ -1008,6 +1030,16 @@ public java.lang.String getTokenReviewerJwtInput(); --- +##### `useAnnotationsAsAliasMetadataInput`Optional + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadataInput(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + ##### `backend`Required ```java @@ -1108,6 +1140,16 @@ public java.lang.String getTokenReviewerJwt(); --- +##### `useAnnotationsAsAliasMetadata`Required + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadata(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1159,6 +1201,8 @@ KubernetesAuthBackendConfigConfig.builder() // .namespace(java.lang.String) // .pemKeys(java.util.List) // .tokenReviewerJwt(java.lang.String) +// .useAnnotationsAsAliasMetadata(java.lang.Boolean) +// .useAnnotationsAsAliasMetadata(IResolvable) .build(); ``` @@ -1177,12 +1221,13 @@ KubernetesAuthBackendConfigConfig.builder() | backend | java.lang.String | Unique name of the kubernetes backend to configure. | | disableIssValidation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | java.lang.String | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | java.lang.String | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pemKeys | java.util.List | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | tokenReviewerJwt | java.lang.String | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| useAnnotationsAsAliasMetadata | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1266,7 +1311,7 @@ public java.lang.String getKubernetesHost(); Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1280,7 +1325,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1294,7 +1339,7 @@ public java.lang.Object getDisableIssValidation(); Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1308,7 +1353,7 @@ public java.lang.Object getDisableLocalCaJwt(); Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1320,7 +1365,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1337,7 +1382,7 @@ public java.lang.String getIssuer(); Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1351,7 +1396,7 @@ public java.lang.String getKubernetesCaCert(); PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1365,7 +1410,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1381,7 +1426,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1397,7 +1442,21 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +```java +public java.lang.Object getUseAnnotationsAsAliasMetadata(); +``` + +- *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/kubernetesAuthBackendConfig.python.md b/docs/kubernetesAuthBackendConfig.python.md index d64c8e36..b2af9e13 100644 --- a/docs/kubernetesAuthBackendConfig.python.md +++ b/docs/kubernetesAuthBackendConfig.python.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -30,7 +30,8 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfig( kubernetes_ca_cert: str = None, namespace: str = None, pem_keys: typing.List[str] = None, - token_reviewer_jwt: str = None + token_reviewer_jwt: str = None, + use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None ) ``` @@ -49,12 +50,13 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | str | Target namespace. (requires Enterprise). | | pem_keys | typing.List[str] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | token_reviewer_jwt | str | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -124,7 +126,7 @@ Must be unique amongst siblings in the same scope Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -134,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -144,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -154,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -162,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -175,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -185,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -195,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -207,7 +209,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -219,7 +221,17 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `use_annotations_as_alias_metadata`Optional + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- @@ -259,6 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_namespace | *No description.* | | reset_pem_keys | *No description.* | | reset_token_reviewer_jwt | *No description.* | +| reset_use_annotations_as_alias_metadata | *No description.* | --- @@ -641,6 +654,12 @@ def reset_pem_keys() -> None def reset_token_reviewer_jwt() -> None ``` +##### `reset_use_annotations_as_alias_metadata` + +```python +def reset_use_annotations_as_alias_metadata() -> None +``` + #### Static Functions | **Name** | **Description** | @@ -755,7 +774,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -795,6 +814,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespace_input | str | *No description.* | | pem_keys_input | typing.List[str] | *No description.* | | token_reviewer_jwt_input | str | *No description.* | +| use_annotations_as_alias_metadata_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | backend | str | *No description.* | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | *No description.* | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -805,6 +825,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespace | str | *No description.* | | pem_keys | typing.List[str] | *No description.* | | token_reviewer_jwt | str | *No description.* | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | *No description.* | --- @@ -1050,6 +1071,16 @@ token_reviewer_jwt_input: str --- +##### `use_annotations_as_alias_metadata_input`Optional + +```python +use_annotations_as_alias_metadata_input: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + ##### `backend`Required ```python @@ -1150,6 +1181,16 @@ token_reviewer_jwt: str --- +##### `use_annotations_as_alias_metadata`Required + +```python +use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -1194,7 +1235,8 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfigConfig( kubernetes_ca_cert: str = None, namespace: str = None, pem_keys: typing.List[str] = None, - token_reviewer_jwt: str = None + token_reviewer_jwt: str = None, + use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] = None ) ``` @@ -1213,12 +1255,13 @@ kubernetesAuthBackendConfig.KubernetesAuthBackendConfigConfig( | backend | str | Unique name of the kubernetes backend to configure. | | disable_iss_validation | typing.Union[bool, cdktf.IResolvable] | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | str | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetes_ca_cert | str | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | str | Target namespace. (requires Enterprise). | | pem_keys | typing.List[str] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | token_reviewer_jwt | str | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| use_annotations_as_alias_metadata | typing.Union[bool, cdktf.IResolvable] | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1302,7 +1345,7 @@ kubernetes_host: str Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1316,7 +1359,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1330,7 +1373,7 @@ disable_iss_validation: typing.Union[bool, IResolvable] Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1344,7 +1387,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1356,7 +1399,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1373,7 +1416,7 @@ issuer: str Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1387,7 +1430,7 @@ kubernetes_ca_cert: str PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1401,7 +1444,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1417,7 +1460,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1433,7 +1476,21 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `use_annotations_as_alias_metadata`Optional + +```python +use_annotations_as_alias_metadata: typing.Union[bool, IResolvable] +``` + +- *Type:* typing.Union[bool, cdktf.IResolvable] + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/kubernetesAuthBackendConfig.typescript.md b/docs/kubernetesAuthBackendConfig.typescript.md index f223874f..562ab5c9 100644 --- a/docs/kubernetesAuthBackendConfig.typescript.md +++ b/docs/kubernetesAuthBackendConfig.typescript.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendConfig -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config vault_kubernetes_auth_backend_config}. #### Initializers @@ -82,6 +82,7 @@ Must be unique amongst siblings in the same scope | resetNamespace | *No description.* | | resetPemKeys | *No description.* | | resetTokenReviewerJwt | *No description.* | +| resetUseAnnotationsAsAliasMetadata | *No description.* | --- @@ -427,6 +428,12 @@ public resetPemKeys(): void public resetTokenReviewerJwt(): void ``` +##### `resetUseAnnotationsAsAliasMetadata` + +```typescript +public resetUseAnnotationsAsAliasMetadata(): void +``` + #### Static Functions | **Name** | **Description** | @@ -530,7 +537,7 @@ The construct id used in the generated config for the KubernetesAuthBackendConfi The id of the existing KubernetesAuthBackendConfig that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#import import section} in the documentation of this resource for the id to use --- @@ -570,6 +577,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespaceInput | string | *No description.* | | pemKeysInput | string[] | *No description.* | | tokenReviewerJwtInput | string | *No description.* | +| useAnnotationsAsAliasMetadataInput | boolean \| cdktf.IResolvable | *No description.* | | backend | string | *No description.* | | disableIssValidation | boolean \| cdktf.IResolvable | *No description.* | | disableLocalCaJwt | boolean \| cdktf.IResolvable | *No description.* | @@ -580,6 +588,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | namespace | string | *No description.* | | pemKeys | string[] | *No description.* | | tokenReviewerJwt | string | *No description.* | +| useAnnotationsAsAliasMetadata | boolean \| cdktf.IResolvable | *No description.* | --- @@ -825,6 +834,16 @@ public readonly tokenReviewerJwtInput: string; --- +##### `useAnnotationsAsAliasMetadataInput`Optional + +```typescript +public readonly useAnnotationsAsAliasMetadataInput: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + ##### `backend`Required ```typescript @@ -925,6 +944,16 @@ public readonly tokenReviewerJwt: string; --- +##### `useAnnotationsAsAliasMetadata`Required + +```typescript +public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +--- + #### Constants | **Name** | **Type** | **Description** | @@ -970,12 +999,13 @@ const kubernetesAuthBackendConfigConfig: kubernetesAuthBackendConfig.KubernetesA | backend | string | Unique name of the kubernetes backend to configure. | | disableIssValidation | boolean \| cdktf.IResolvable | Optional disable JWT issuer validation. Allows to skip ISS validation. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. | | issuer | string | Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. | | kubernetesCaCert | string | PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. | | namespace | string | Target namespace. (requires Enterprise). | | pemKeys | string[] | Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. | | tokenReviewerJwt | string | A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. | +| useAnnotationsAsAliasMetadata | boolean \| cdktf.IResolvable | Use annotations from the client token's associated service account as alias metadata for the Vault entity. | --- @@ -1059,7 +1089,7 @@ public readonly kubernetesHost: string; Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_host KubernetesAuthBackendConfig#kubernetes_host} --- @@ -1073,7 +1103,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#backend KubernetesAuthBackendConfig#backend} --- @@ -1087,7 +1117,7 @@ public readonly disableIssValidation: boolean | IResolvable; Optional disable JWT issuer validation. Allows to skip ISS validation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_iss_validation KubernetesAuthBackendConfig#disable_iss_validation} --- @@ -1101,7 +1131,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Optional disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#disable_local_ca_jwt KubernetesAuthBackendConfig#disable_local_ca_jwt} --- @@ -1113,7 +1143,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#id KubernetesAuthBackendConfig#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1130,7 +1160,7 @@ public readonly issuer: string; Optional JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#issuer KubernetesAuthBackendConfig#issuer} --- @@ -1144,7 +1174,7 @@ public readonly kubernetesCaCert: string; PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#kubernetes_ca_cert KubernetesAuthBackendConfig#kubernetes_ca_cert} --- @@ -1158,7 +1188,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#namespace KubernetesAuthBackendConfig#namespace} --- @@ -1174,7 +1204,7 @@ Optional list of PEM-formatted public keys or certificates used to verify the si If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#pem_keys KubernetesAuthBackendConfig#pem_keys} --- @@ -1190,7 +1220,21 @@ A service account JWT (or other token) used as a bearer token to access the Toke If not set the JWT used for login will be used to access the API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#token_reviewer_jwt KubernetesAuthBackendConfig#token_reviewer_jwt} + +--- + +##### `useAnnotationsAsAliasMetadata`Optional + +```typescript +public readonly useAnnotationsAsAliasMetadata: boolean | IResolvable; +``` + +- *Type:* boolean | cdktf.IResolvable + +Use annotations from the client token's associated service account as alias metadata for the Vault entity. + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_config#use_annotations_as_alias_metadata KubernetesAuthBackendConfig#use_annotations_as_alias_metadata} --- diff --git a/docs/kubernetesAuthBackendRole.csharp.md b/docs/kubernetesAuthBackendRole.csharp.md index 0fb64f1b..ffca7368 100644 --- a/docs/kubernetesAuthBackendRole.csharp.md +++ b/docs/kubernetesAuthBackendRole.csharp.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1186,7 +1186,7 @@ new KubernetesAuthBackendRoleConfig { | AliasNameSource | string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | Audience | string | Optional Audience claim to verify in the JWT. | | Backend | string | Unique name of the kubernetes backend to configure. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | @@ -1282,7 +1282,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1298,7 +1298,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1312,7 +1312,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1326,7 +1326,7 @@ public string AliasNameSource { get; set; } Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1340,7 +1340,7 @@ public string Audience { get; set; } Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1354,7 +1354,7 @@ public string Backend { get; set; } Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1366,7 +1366,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1383,7 +1383,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1397,7 +1397,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1411,7 +1411,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1425,7 +1425,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1439,7 +1439,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1453,7 +1453,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1467,7 +1467,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1481,7 +1481,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1495,7 +1495,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1509,7 +1509,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.go.md b/docs/kubernetesAuthBackendRole.go.md index c5eb724c..942507f7 100644 --- a/docs/kubernetesAuthBackendRole.go.md +++ b/docs/kubernetesAuthBackendRole.go.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1186,7 +1186,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetesauthbackend | AliasNameSource | *string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | Audience | *string | Optional Audience claim to verify in the JWT. | | Backend | *string | Unique name of the kubernetes backend to configure. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | @@ -1282,7 +1282,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1298,7 +1298,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1312,7 +1312,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1326,7 +1326,7 @@ AliasNameSource *string Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1340,7 +1340,7 @@ Audience *string Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1354,7 +1354,7 @@ Backend *string Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1366,7 +1366,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1383,7 +1383,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1397,7 +1397,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1411,7 +1411,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1425,7 +1425,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1439,7 +1439,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1453,7 +1453,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1467,7 +1467,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1481,7 +1481,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1495,7 +1495,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1509,7 +1509,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.java.md b/docs/kubernetesAuthBackendRole.java.md index 7685c3d7..cbc5b7ad 100644 --- a/docs/kubernetesAuthBackendRole.java.md +++ b/docs/kubernetesAuthBackendRole.java.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -61,7 +61,7 @@ KubernetesAuthBackendRole.Builder.create(Construct scope, java.lang.String id) | aliasNameSource | java.lang.String | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -143,7 +143,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -155,7 +155,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -203,7 +203,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -216,7 +216,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- @@ -831,7 +831,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1457,7 +1457,7 @@ KubernetesAuthBackendRoleConfig.builder() | aliasNameSource | java.lang.String | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | java.lang.String | Optional Audience claim to verify in the JWT. | | backend | java.lang.String | Unique name of the kubernetes backend to configure. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1553,7 +1553,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1569,7 +1569,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1583,7 +1583,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1597,7 +1597,7 @@ public java.lang.String getAliasNameSource(); Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1611,7 +1611,7 @@ public java.lang.String getAudience(); Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1625,7 +1625,7 @@ public java.lang.String getBackend(); Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1637,7 +1637,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1654,7 +1654,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1668,7 +1668,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1682,7 +1682,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1696,7 +1696,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1710,7 +1710,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1724,7 +1724,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1738,7 +1738,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1752,7 +1752,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1766,7 +1766,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1780,7 +1780,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.python.md b/docs/kubernetesAuthBackendRole.python.md index 1bb54902..4ff53127 100644 --- a/docs/kubernetesAuthBackendRole.python.md +++ b/docs/kubernetesAuthBackendRole.python.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -58,7 +58,7 @@ kubernetesAuthBackendRole.KubernetesAuthBackendRole( | alias_name_source | str | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -140,7 +140,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -152,7 +152,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -162,7 +162,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -253,7 +253,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -263,7 +263,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -273,7 +273,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- @@ -874,7 +874,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1495,7 +1495,7 @@ kubernetesAuthBackendRole.KubernetesAuthBackendRoleConfig( | alias_name_source | str | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | str | Optional Audience claim to verify in the JWT. | | backend | str | Unique name of the kubernetes backend to configure. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | @@ -1591,7 +1591,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1607,7 +1607,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1621,7 +1621,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1635,7 +1635,7 @@ alias_name_source: str Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1649,7 +1649,7 @@ audience: str Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1663,7 +1663,7 @@ backend: str Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1675,7 +1675,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1692,7 +1692,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1706,7 +1706,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1720,7 +1720,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1734,7 +1734,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1748,7 +1748,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1762,7 +1762,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1776,7 +1776,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1790,7 +1790,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1804,7 +1804,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1818,7 +1818,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesAuthBackendRole.typescript.md b/docs/kubernetesAuthBackendRole.typescript.md index bf577459..e07bd880 100644 --- a/docs/kubernetesAuthBackendRole.typescript.md +++ b/docs/kubernetesAuthBackendRole.typescript.md @@ -4,7 +4,7 @@ ### KubernetesAuthBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role vault_kubernetes_auth_backend_role}. #### Initializers @@ -565,7 +565,7 @@ The construct id used in the generated config for the KubernetesAuthBackendRole The id of the existing KubernetesAuthBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1161,7 +1161,7 @@ const kubernetesAuthBackendRoleConfig: kubernetesAuthBackendRole.KubernetesAuthB | aliasNameSource | string | Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. | | audience | string | Optional Audience claim to verify in the JWT. | | backend | string | Unique name of the kubernetes backend to configure. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | @@ -1257,7 +1257,7 @@ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_names KubernetesAuthBackendRole#bound_service_account_names} --- @@ -1273,7 +1273,7 @@ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#bound_service_account_namespaces KubernetesAuthBackendRole#bound_service_account_namespaces} --- @@ -1287,7 +1287,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#role_name KubernetesAuthBackendRole#role_name} --- @@ -1301,7 +1301,7 @@ public readonly aliasNameSource: string; Configures how identity aliases are generated. Valid choices are: serviceaccount_uid, serviceaccount_name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#alias_name_source KubernetesAuthBackendRole#alias_name_source} --- @@ -1315,7 +1315,7 @@ public readonly audience: string; Optional Audience claim to verify in the JWT. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#audience KubernetesAuthBackendRole#audience} --- @@ -1329,7 +1329,7 @@ public readonly backend: string; Unique name of the kubernetes backend to configure. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#backend KubernetesAuthBackendRole#backend} --- @@ -1341,7 +1341,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#id KubernetesAuthBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1358,7 +1358,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#namespace KubernetesAuthBackendRole#namespace} --- @@ -1372,7 +1372,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_bound_cidrs KubernetesAuthBackendRole#token_bound_cidrs} --- @@ -1386,7 +1386,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_explicit_max_ttl KubernetesAuthBackendRole#token_explicit_max_ttl} --- @@ -1400,7 +1400,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_max_ttl KubernetesAuthBackendRole#token_max_ttl} --- @@ -1414,7 +1414,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_no_default_policy KubernetesAuthBackendRole#token_no_default_policy} --- @@ -1428,7 +1428,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_num_uses KubernetesAuthBackendRole#token_num_uses} --- @@ -1442,7 +1442,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_period KubernetesAuthBackendRole#token_period} --- @@ -1456,7 +1456,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_policies KubernetesAuthBackendRole#token_policies} --- @@ -1470,7 +1470,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_ttl KubernetesAuthBackendRole#token_ttl} --- @@ -1484,7 +1484,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_auth_backend_role#token_type KubernetesAuthBackendRole#token_type} --- diff --git a/docs/kubernetesSecretBackend.csharp.md b/docs/kubernetesSecretBackend.csharp.md index 405f2765..192e3d23 100644 --- a/docs/kubernetesSecretBackend.csharp.md +++ b/docs/kubernetesSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -621,7 +621,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1395,7 +1395,7 @@ new KubernetesSecretBackendConfig { | Description | string | Human-friendly description of the mount. | | DisableLocalCaJwt | object | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | IdentityTokenKey | string | The key to use for signing plugin workload identity tokens. | | KubernetesCaCert | string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | KubernetesHost | string | The Kubernetes API URL to connect to. | @@ -1491,7 +1491,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1505,7 +1505,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1519,7 +1519,7 @@ public string[] AllowedResponseHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -1533,7 +1533,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1547,7 +1547,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1561,7 +1561,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1575,7 +1575,7 @@ public string[] DelegatedAuthAccessors { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -1589,7 +1589,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1603,7 +1603,7 @@ public object DisableLocalCaJwt { get; set; } Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1617,7 +1617,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1629,7 +1629,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1646,7 +1646,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -1662,7 +1662,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1676,7 +1676,7 @@ public string KubernetesHost { get; set; } The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1690,7 +1690,7 @@ public string ListingVisibility { get; set; } Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -1704,7 +1704,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1718,7 +1718,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1732,7 +1732,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1746,7 +1746,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1760,7 +1760,7 @@ public string[] PassthroughRequestHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -1774,7 +1774,7 @@ public string PluginVersion { get; set; } Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -1788,7 +1788,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1804,7 +1804,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.go.md b/docs/kubernetesSecretBackend.go.md index 1f709c48..59540254 100644 --- a/docs/kubernetesSecretBackend.go.md +++ b/docs/kubernetesSecretBackend.go.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -621,7 +621,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1395,7 +1395,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbacke | Description | *string | Human-friendly description of the mount. | | DisableLocalCaJwt | interface{} | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | IdentityTokenKey | *string | The key to use for signing plugin workload identity tokens. | | KubernetesCaCert | *string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | KubernetesHost | *string | The Kubernetes API URL to connect to. | @@ -1491,7 +1491,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1505,7 +1505,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1519,7 +1519,7 @@ AllowedResponseHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -1533,7 +1533,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1547,7 +1547,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1561,7 +1561,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1575,7 +1575,7 @@ DelegatedAuthAccessors *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -1589,7 +1589,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1603,7 +1603,7 @@ DisableLocalCaJwt interface{} Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1617,7 +1617,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1629,7 +1629,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1646,7 +1646,7 @@ IdentityTokenKey *string The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -1662,7 +1662,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1676,7 +1676,7 @@ KubernetesHost *string The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1690,7 +1690,7 @@ ListingVisibility *string Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -1704,7 +1704,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1718,7 +1718,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1732,7 +1732,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1746,7 +1746,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1760,7 +1760,7 @@ PassthroughRequestHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -1774,7 +1774,7 @@ PluginVersion *string Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -1788,7 +1788,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1804,7 +1804,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.java.md b/docs/kubernetesSecretBackend.java.md index 6e1c4485..4244e7b0 100644 --- a/docs/kubernetesSecretBackend.java.md +++ b/docs/kubernetesSecretBackend.java.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -74,7 +74,7 @@ KubernetesSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | kubernetesCaCert | java.lang.String | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | java.lang.String | The Kubernetes API URL to connect to. | @@ -156,7 +156,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -254,7 +254,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -267,7 +267,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -279,7 +279,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -299,7 +299,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -309,7 +309,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -319,7 +319,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -329,7 +329,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -339,7 +339,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -349,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -369,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -381,7 +381,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- @@ -962,7 +962,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1744,7 +1744,7 @@ KubernetesSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount. | | disableLocalCaJwt | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | kubernetesCaCert | java.lang.String | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | java.lang.String | The Kubernetes API URL to connect to. | @@ -1840,7 +1840,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1854,7 +1854,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1868,7 +1868,7 @@ public java.util.List getAllowedResponseHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -1882,7 +1882,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1896,7 +1896,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1910,7 +1910,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1924,7 +1924,7 @@ public java.util.List getDelegatedAuthAccessors(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -1938,7 +1938,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1952,7 +1952,7 @@ public java.lang.Object getDisableLocalCaJwt(); Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1966,7 +1966,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1978,7 +1978,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1995,7 +1995,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -2011,7 +2011,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -2025,7 +2025,7 @@ public java.lang.String getKubernetesHost(); The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -2039,7 +2039,7 @@ public java.lang.String getListingVisibility(); Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -2053,7 +2053,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -2067,7 +2067,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -2081,7 +2081,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -2095,7 +2095,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -2109,7 +2109,7 @@ public java.util.List getPassthroughRequestHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -2123,7 +2123,7 @@ public java.lang.String getPluginVersion(); Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -2137,7 +2137,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -2153,7 +2153,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.python.md b/docs/kubernetesSecretBackend.python.md index 2dbeb607..fbb68c72 100644 --- a/docs/kubernetesSecretBackend.python.md +++ b/docs/kubernetesSecretBackend.python.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -68,7 +68,7 @@ kubernetesSecretBackend.KubernetesSecretBackend( | description | str | Human-friendly description of the mount. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | kubernetes_ca_cert | str | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetes_host | str | The Kubernetes API URL to connect to. | @@ -150,7 +150,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -220,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -230,7 +230,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -240,7 +240,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -248,7 +248,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -261,7 +261,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -273,7 +273,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -283,7 +283,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -293,7 +293,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -303,7 +303,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -313,7 +313,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -323,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -343,7 +343,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -353,7 +353,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -363,7 +363,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -375,7 +375,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- @@ -1002,7 +1002,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1776,7 +1776,7 @@ kubernetesSecretBackend.KubernetesSecretBackendConfig( | description | str | Human-friendly description of the mount. | | disable_local_ca_jwt | typing.Union[bool, cdktf.IResolvable] | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | kubernetes_ca_cert | str | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetes_host | str | The Kubernetes API URL to connect to. | @@ -1872,7 +1872,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1886,7 +1886,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1900,7 +1900,7 @@ allowed_response_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -1914,7 +1914,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1928,7 +1928,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1942,7 +1942,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1956,7 +1956,7 @@ delegated_auth_accessors: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -1970,7 +1970,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1984,7 +1984,7 @@ disable_local_ca_jwt: typing.Union[bool, IResolvable] Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1998,7 +1998,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -2010,7 +2010,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2027,7 +2027,7 @@ identity_token_key: str The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -2043,7 +2043,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -2057,7 +2057,7 @@ kubernetes_host: str The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -2071,7 +2071,7 @@ listing_visibility: str Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -2085,7 +2085,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -2099,7 +2099,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -2113,7 +2113,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -2127,7 +2127,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -2141,7 +2141,7 @@ passthrough_request_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -2155,7 +2155,7 @@ plugin_version: str Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -2169,7 +2169,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -2185,7 +2185,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackend.typescript.md b/docs/kubernetesSecretBackend.typescript.md index 0ffb6937..12e99ad7 100644 --- a/docs/kubernetesSecretBackend.typescript.md +++ b/docs/kubernetesSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend vault_kubernetes_secret_backend}. #### Initializers @@ -621,7 +621,7 @@ The construct id used in the generated config for the KubernetesSecretBackend to The id of the existing KubernetesSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1364,7 +1364,7 @@ const kubernetesSecretBackendConfig: kubernetesSecretBackend.KubernetesSecretBac | description | string | Human-friendly description of the mount. | | disableLocalCaJwt | boolean \| cdktf.IResolvable | Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. | | identityTokenKey | string | The key to use for signing plugin workload identity tokens. | | kubernetesCaCert | string | A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes API server certificate. | | kubernetesHost | string | The Kubernetes API URL to connect to. | @@ -1460,7 +1460,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#path KubernetesSecretBackend#path} --- @@ -1474,7 +1474,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_managed_keys KubernetesSecretBackend#allowed_managed_keys} --- @@ -1488,7 +1488,7 @@ public readonly allowedResponseHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#allowed_response_headers KubernetesSecretBackend#allowed_response_headers} --- @@ -1502,7 +1502,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_request_keys KubernetesSecretBackend#audit_non_hmac_request_keys} --- @@ -1516,7 +1516,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#audit_non_hmac_response_keys KubernetesSecretBackend#audit_non_hmac_response_keys} --- @@ -1530,7 +1530,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#default_lease_ttl_seconds KubernetesSecretBackend#default_lease_ttl_seconds} --- @@ -1544,7 +1544,7 @@ public readonly delegatedAuthAccessors: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#delegated_auth_accessors KubernetesSecretBackend#delegated_auth_accessors} --- @@ -1558,7 +1558,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#description KubernetesSecretBackend#description} --- @@ -1572,7 +1572,7 @@ public readonly disableLocalCaJwt: boolean | IResolvable; Disable defaulting to the local CA certificate and service account JWT when running in a Kubernetes pod. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#disable_local_ca_jwt KubernetesSecretBackend#disable_local_ca_jwt} --- @@ -1586,7 +1586,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#external_entropy_access KubernetesSecretBackend#external_entropy_access} --- @@ -1598,7 +1598,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#id KubernetesSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1615,7 +1615,7 @@ public readonly identityTokenKey: string; The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#identity_token_key KubernetesSecretBackend#identity_token_key} --- @@ -1631,7 +1631,7 @@ A PEM-encoded CA certificate used by the secret engine to verify the Kubernetes Defaults to the local pod’s CA if found, or otherwise the host's root CA set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_ca_cert KubernetesSecretBackend#kubernetes_ca_cert} --- @@ -1645,7 +1645,7 @@ public readonly kubernetesHost: string; The Kubernetes API URL to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#kubernetes_host KubernetesSecretBackend#kubernetes_host} --- @@ -1659,7 +1659,7 @@ public readonly listingVisibility: string; Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#listing_visibility KubernetesSecretBackend#listing_visibility} --- @@ -1673,7 +1673,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#local KubernetesSecretBackend#local} --- @@ -1687,7 +1687,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#max_lease_ttl_seconds KubernetesSecretBackend#max_lease_ttl_seconds} --- @@ -1701,7 +1701,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#namespace KubernetesSecretBackend#namespace} --- @@ -1715,7 +1715,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#options KubernetesSecretBackend#options} --- @@ -1729,7 +1729,7 @@ public readonly passthroughRequestHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#passthrough_request_headers KubernetesSecretBackend#passthrough_request_headers} --- @@ -1743,7 +1743,7 @@ public readonly pluginVersion: string; Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#plugin_version KubernetesSecretBackend#plugin_version} --- @@ -1757,7 +1757,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#seal_wrap KubernetesSecretBackend#seal_wrap} --- @@ -1773,7 +1773,7 @@ The JSON web token of the service account used by the secrets engine to manage K Defaults to the local pod’s JWT if found. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend#service_account_jwt KubernetesSecretBackend#service_account_jwt} --- diff --git a/docs/kubernetesSecretBackendRole.csharp.md b/docs/kubernetesSecretBackendRole.csharp.md index adc2edad..e925c1ae 100644 --- a/docs/kubernetesSecretBackendRole.csharp.md +++ b/docs/kubernetesSecretBackendRole.csharp.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1134,7 +1134,7 @@ new KubernetesSecretBackendRoleConfig { | ExtraAnnotations | System.Collections.Generic.IDictionary | Additional annotations to apply to all generated Kubernetes objects. | | ExtraLabels | System.Collections.Generic.IDictionary | Additional labels to apply to all generated Kubernetes objects. | | GeneratedRoleRules | string | The Role or ClusterRole rules to use when generating a role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | KubernetesRoleName | string | The pre-existing Role or ClusterRole to bind a generated service account to. | | KubernetesRoleType | string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1225,7 +1225,7 @@ public string Backend { get; set; } The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1239,7 +1239,7 @@ public string Name { get; set; } The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1255,7 +1255,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1271,7 +1271,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -1285,7 +1285,7 @@ public System.Collections.Generic.IDictionary ExtraAnnotations { Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1299,7 +1299,7 @@ public System.Collections.Generic.IDictionary ExtraLabels { get; Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1315,7 +1315,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1327,7 +1327,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1346,7 +1346,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1360,7 +1360,7 @@ public string KubernetesRoleType { get; set; } Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1374,7 +1374,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1390,7 +1390,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1406,7 +1406,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1420,7 +1420,7 @@ public double TokenDefaultTtl { get; set; } The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1434,7 +1434,7 @@ public double TokenMaxTtl { get; set; } The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.go.md b/docs/kubernetesSecretBackendRole.go.md index dd45a884..b3612a7c 100644 --- a/docs/kubernetesSecretBackendRole.go.md +++ b/docs/kubernetesSecretBackendRole.go.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1134,7 +1134,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kubernetessecretbacke | ExtraAnnotations | *map[string]*string | Additional annotations to apply to all generated Kubernetes objects. | | ExtraLabels | *map[string]*string | Additional labels to apply to all generated Kubernetes objects. | | GeneratedRoleRules | *string | The Role or ClusterRole rules to use when generating a role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | KubernetesRoleName | *string | The pre-existing Role or ClusterRole to bind a generated service account to. | | KubernetesRoleType | *string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1225,7 +1225,7 @@ Backend *string The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1239,7 +1239,7 @@ Name *string The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1255,7 +1255,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1271,7 +1271,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -1285,7 +1285,7 @@ ExtraAnnotations *map[string]*string Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1299,7 +1299,7 @@ ExtraLabels *map[string]*string Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1315,7 +1315,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1327,7 +1327,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1346,7 +1346,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1360,7 +1360,7 @@ KubernetesRoleType *string Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1374,7 +1374,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1390,7 +1390,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1406,7 +1406,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1420,7 +1420,7 @@ TokenDefaultTtl *f64 The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1434,7 +1434,7 @@ TokenMaxTtl *f64 The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.java.md b/docs/kubernetesSecretBackendRole.java.md index 60421ff1..fbda999f 100644 --- a/docs/kubernetesSecretBackendRole.java.md +++ b/docs/kubernetesSecretBackendRole.java.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -59,7 +59,7 @@ KubernetesSecretBackendRole.Builder.create(Construct scope, java.lang.String id) | extraAnnotations | java.util.Map | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | java.util.Map | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | java.lang.String | The Role or ClusterRole rules to use when generating a role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | java.lang.String | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | java.lang.String | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -158,7 +158,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -170,7 +170,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -202,7 +202,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -225,7 +225,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -257,7 +257,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -269,7 +269,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -279,7 +279,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -289,7 +289,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- @@ -807,7 +807,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1387,7 +1387,7 @@ KubernetesSecretBackendRoleConfig.builder() | extraAnnotations | java.util.Map | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | java.util.Map | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | java.lang.String | The Role or ClusterRole rules to use when generating a role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | java.lang.String | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | java.lang.String | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1478,7 +1478,7 @@ public java.lang.String getBackend(); The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1492,7 +1492,7 @@ public java.lang.String getName(); The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1508,7 +1508,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1524,7 +1524,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -1538,7 +1538,7 @@ public java.util.Map getExtraAnnotations(); Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1552,7 +1552,7 @@ public java.util.Map getExtraLabels(); Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1568,7 +1568,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1580,7 +1580,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1599,7 +1599,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1613,7 +1613,7 @@ public java.lang.String getKubernetesRoleType(); Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1627,7 +1627,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1643,7 +1643,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1659,7 +1659,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1673,7 +1673,7 @@ public java.lang.Number getTokenDefaultTtl(); The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1687,7 +1687,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.python.md b/docs/kubernetesSecretBackendRole.python.md index de43b9ef..2c64923b 100644 --- a/docs/kubernetesSecretBackendRole.python.md +++ b/docs/kubernetesSecretBackendRole.python.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -57,7 +57,7 @@ kubernetesSecretBackendRole.KubernetesSecretBackendRole( | extra_annotations | typing.Mapping[str] | Additional annotations to apply to all generated Kubernetes objects. | | extra_labels | typing.Mapping[str] | Additional labels to apply to all generated Kubernetes objects. | | generated_role_rules | str | The Role or ClusterRole rules to use when generating a role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetes_role_name | str | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetes_role_type | str | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | str | Target namespace. (requires Enterprise). | @@ -134,7 +134,7 @@ Must be unique amongst siblings in the same scope The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -156,7 +156,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -168,7 +168,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -200,7 +200,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -223,7 +223,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -233,7 +233,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -255,7 +255,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -267,7 +267,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -277,7 +277,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -287,7 +287,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- @@ -851,7 +851,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1427,7 +1427,7 @@ kubernetesSecretBackendRole.KubernetesSecretBackendRoleConfig( | extra_annotations | typing.Mapping[str] | Additional annotations to apply to all generated Kubernetes objects. | | extra_labels | typing.Mapping[str] | Additional labels to apply to all generated Kubernetes objects. | | generated_role_rules | str | The Role or ClusterRole rules to use when generating a role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetes_role_name | str | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetes_role_type | str | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1518,7 +1518,7 @@ backend: str The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1532,7 +1532,7 @@ name: str The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1548,7 +1548,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1564,7 +1564,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -1578,7 +1578,7 @@ extra_annotations: typing.Mapping[str] Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1592,7 +1592,7 @@ extra_labels: typing.Mapping[str] Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1608,7 +1608,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1620,7 +1620,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1639,7 +1639,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1653,7 +1653,7 @@ kubernetes_role_type: str Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1667,7 +1667,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1683,7 +1683,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1699,7 +1699,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1713,7 +1713,7 @@ token_default_ttl: typing.Union[int, float] The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1727,7 +1727,7 @@ token_max_ttl: typing.Union[int, float] The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kubernetesSecretBackendRole.typescript.md b/docs/kubernetesSecretBackendRole.typescript.md index 27ee7084..15d7ed27 100644 --- a/docs/kubernetesSecretBackendRole.typescript.md +++ b/docs/kubernetesSecretBackendRole.typescript.md @@ -4,7 +4,7 @@ ### KubernetesSecretBackendRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role vault_kubernetes_secret_backend_role}. #### Initializers @@ -558,7 +558,7 @@ The construct id used in the generated config for the KubernetesSecretBackendRol The id of the existing KubernetesSecretBackendRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#import import section} in the documentation of this resource for the id to use --- @@ -1111,7 +1111,7 @@ const kubernetesSecretBackendRoleConfig: kubernetesSecretBackendRole.KubernetesS | extraAnnotations | {[ key: string ]: string} | Additional annotations to apply to all generated Kubernetes objects. | | extraLabels | {[ key: string ]: string} | Additional labels to apply to all generated Kubernetes objects. | | generatedRoleRules | string | The Role or ClusterRole rules to use when generating a role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. | | kubernetesRoleName | string | The pre-existing Role or ClusterRole to bind a generated service account to. | | kubernetesRoleType | string | Specifies whether the Kubernetes role is a Role or ClusterRole. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1202,7 +1202,7 @@ public readonly backend: string; The mount path for the Kubernetes secrets engine. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#backend KubernetesSecretBackendRole#backend} --- @@ -1216,7 +1216,7 @@ public readonly name: string; The name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name KubernetesSecretBackendRole#name} --- @@ -1232,7 +1232,7 @@ The list of Kubernetes namespaces this role can generate credentials for. If set to '*' all namespaces are allowed. If set with`allowed_kubernetes_namespace_selector`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespaces KubernetesSecretBackendRole#allowed_kubernetes_namespaces} --- @@ -1248,7 +1248,7 @@ A label selector for Kubernetes namespaces in which credentials can begenerated. Accepts either a JSON or YAML object. The value should be of typeLabelSelector. If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#allowed_kubernetes_namespace_selector KubernetesSecretBackendRole#allowed_kubernetes_namespace_selector} --- @@ -1262,7 +1262,7 @@ public readonly extraAnnotations: {[ key: string ]: string}; Additional annotations to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_annotations KubernetesSecretBackendRole#extra_annotations} --- @@ -1276,7 +1276,7 @@ public readonly extraLabels: {[ key: string ]: string}; Additional labels to apply to all generated Kubernetes objects. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#extra_labels KubernetesSecretBackendRole#extra_labels} --- @@ -1292,7 +1292,7 @@ The Role or ClusterRole rules to use when generating a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with 'service_account_name' and 'kubernetes_role_name'. If set, the entire chain of Kubernetes objects will be generated when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#generated_role_rules KubernetesSecretBackendRole#generated_role_rules} --- @@ -1304,7 +1304,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#id KubernetesSecretBackendRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1323,7 +1323,7 @@ The pre-existing Role or ClusterRole to bind a generated service account to. Mutually exclusive with 'service_account_name' and 'generated_role_rules'. If set, Kubernetes token, service account, and role binding objects will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_name KubernetesSecretBackendRole#kubernetes_role_name} --- @@ -1337,7 +1337,7 @@ public readonly kubernetesRoleType: string; Specifies whether the Kubernetes role is a Role or ClusterRole. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#kubernetes_role_type KubernetesSecretBackendRole#kubernetes_role_type} --- @@ -1351,7 +1351,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#namespace KubernetesSecretBackendRole#namespace} --- @@ -1367,7 +1367,7 @@ The name template to use when generating service accounts, roles and role bindin If unset, a default template is used. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#name_template KubernetesSecretBackendRole#name_template} --- @@ -1383,7 +1383,7 @@ The pre-existing service account to generate tokens for. Mutually exclusive with 'kubernetes_role_name' and 'generated_role_rules'. If set, only a Kubernetes token will be created when credentials are requested. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#service_account_name KubernetesSecretBackendRole#service_account_name} --- @@ -1397,7 +1397,7 @@ public readonly tokenDefaultTtl: number; The default TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_default_ttl KubernetesSecretBackendRole#token_default_ttl} --- @@ -1411,7 +1411,7 @@ public readonly tokenMaxTtl: number; The maximum TTL for generated Kubernetes tokens in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kubernetes_secret_backend_role#token_max_ttl KubernetesSecretBackendRole#token_max_ttl} --- diff --git a/docs/kvSecret.csharp.md b/docs/kvSecret.csharp.md index 344ebf0e..cdb3b07d 100644 --- a/docs/kvSecret.csharp.md +++ b/docs/kvSecret.csharp.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ new KvSecretConfig { | Provisioners | object[] | *No description.* | | DataJson | string | JSON-encoded secret data to write. | | Path | string | Full path of the KV-V1 secret. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -909,7 +909,7 @@ public string Path { get; set; } Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -921,7 +921,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -938,7 +938,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.go.md b/docs/kvSecret.go.md index 55d8f530..3f206da0 100644 --- a/docs/kvSecret.go.md +++ b/docs/kvSecret.go.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -810,7 +810,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecret" | Provisioners | *[]interface{} | *No description.* | | DataJson | *string | JSON-encoded secret data to write. | | Path | *string | Full path of the KV-V1 secret. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -895,7 +895,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -909,7 +909,7 @@ Path *string Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -921,7 +921,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -938,7 +938,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.java.md b/docs/kvSecret.java.md index 23e7ae45..990ba2af 100644 --- a/docs/kvSecret.java.md +++ b/docs/kvSecret.java.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -43,7 +43,7 @@ KvSecret.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | dataJson | java.lang.String | JSON-encoded secret data to write. | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -919,7 +919,7 @@ KvSecretConfig.builder() | provisioners | java.util.List | *No description.* | | dataJson | java.lang.String | JSON-encoded secret data to write. | | path | java.lang.String | Full path of the KV-V1 secret. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1004,7 +1004,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -1018,7 +1018,7 @@ public java.lang.String getPath(); Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -1030,7 +1030,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1047,7 +1047,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.python.md b/docs/kvSecret.python.md index 82318375..b537d7ef 100644 --- a/docs/kvSecret.python.md +++ b/docs/kvSecret.python.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -41,7 +41,7 @@ kvSecret.KvSecret( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | data_json | str | JSON-encoded secret data to write. | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -959,7 +959,7 @@ kvSecret.KvSecretConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | data_json | str | JSON-encoded secret data to write. | | path | str | Full path of the KV-V1 secret. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1044,7 +1044,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -1058,7 +1058,7 @@ path: str Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -1070,7 +1070,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1087,7 +1087,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecret.typescript.md b/docs/kvSecret.typescript.md index 9f41b9f3..e07a44f9 100644 --- a/docs/kvSecret.typescript.md +++ b/docs/kvSecret.typescript.md @@ -4,7 +4,7 @@ ### KvSecret -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret vault_kv_secret}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret vault_kv_secret}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the KvSecret to import. The id of the existing KvSecret that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#import import section} in the documentation of this resource for the id to use --- @@ -798,7 +798,7 @@ const kvSecretConfig: kvSecret.KvSecretConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | dataJson | string | JSON-encoded secret data to write. | | path | string | Full path of the KV-V1 secret. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -883,7 +883,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#data_json KvSecret#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#data_json KvSecret#data_json} --- @@ -897,7 +897,7 @@ public readonly path: string; Full path of the KV-V1 secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#path KvSecret#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#path KvSecret#path} --- @@ -909,7 +909,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#id KvSecret#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#id KvSecret#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -926,7 +926,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret#namespace KvSecret#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret#namespace KvSecret#namespace} --- diff --git a/docs/kvSecretBackendV2.csharp.md b/docs/kvSecretBackendV2.csharp.md index dedffe74..7bf64a29 100644 --- a/docs/kvSecretBackendV2.csharp.md +++ b/docs/kvSecretBackendV2.csharp.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -867,7 +867,7 @@ new KvSecretBackendV2Config { | Mount | string | Path where KV-V2 engine is mounted. | | CasRequired | object | If true, all keys will require the cas parameter to be set on all write requests. | | DeleteVersionAfter | double | If set, specifies the length of time before a version is deleted. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | MaxVersions | double | The number of versions to keep per key. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -953,7 +953,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -967,7 +967,7 @@ public object CasRequired { get; set; } If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -981,7 +981,7 @@ public double DeleteVersionAfter { get; set; } If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -993,7 +993,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ public double MaxVersions { get; set; } The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1024,7 +1024,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.go.md b/docs/kvSecretBackendV2.go.md index 24e26c62..4ff7fbc3 100644 --- a/docs/kvSecretBackendV2.go.md +++ b/docs/kvSecretBackendV2.go.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -867,7 +867,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretbackendv2" | Mount | *string | Path where KV-V2 engine is mounted. | | CasRequired | interface{} | If true, all keys will require the cas parameter to be set on all write requests. | | DeleteVersionAfter | *f64 | If set, specifies the length of time before a version is deleted. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | MaxVersions | *f64 | The number of versions to keep per key. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -953,7 +953,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -967,7 +967,7 @@ CasRequired interface{} If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -981,7 +981,7 @@ DeleteVersionAfter *f64 If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -993,7 +993,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1010,7 +1010,7 @@ MaxVersions *f64 The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1024,7 +1024,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.java.md b/docs/kvSecretBackendV2.java.md index d1a4efd2..afe9a3fa 100644 --- a/docs/kvSecretBackendV2.java.md +++ b/docs/kvSecretBackendV2.java.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -47,7 +47,7 @@ KvSecretBackendV2.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where KV-V2 engine is mounted. | | casRequired | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | java.lang.Number | If set, specifies the length of time before a version is deleted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | java.lang.Number | The number of versions to keep per key. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -119,7 +119,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -129,7 +129,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -139,7 +139,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -160,7 +160,7 @@ If you experience problems setting this value it might not be settable. Please t The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- @@ -632,7 +632,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -1002,7 +1002,7 @@ KvSecretBackendV2Config.builder() | mount | java.lang.String | Path where KV-V2 engine is mounted. | | casRequired | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | java.lang.Number | If set, specifies the length of time before a version is deleted. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | java.lang.Number | The number of versions to keep per key. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1088,7 +1088,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -1102,7 +1102,7 @@ public java.lang.Object getCasRequired(); If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -1116,7 +1116,7 @@ public java.lang.Number getDeleteVersionAfter(); If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -1128,7 +1128,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1145,7 +1145,7 @@ public java.lang.Number getMaxVersions(); The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1159,7 +1159,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.python.md b/docs/kvSecretBackendV2.python.md index 50c2c592..a7ba4203 100644 --- a/docs/kvSecretBackendV2.python.md +++ b/docs/kvSecretBackendV2.python.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -44,7 +44,7 @@ kvSecretBackendV2.KvSecretBackendV2( | mount | str | Path where KV-V2 engine is mounted. | | cas_required | typing.Union[bool, cdktf.IResolvable] | If true, all keys will require the cas parameter to be set on all write requests. | | delete_version_after | typing.Union[int, float] | If set, specifies the length of time before a version is deleted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | max_versions | typing.Union[int, float] | The number of versions to keep per key. | | namespace | str | Target namespace. (requires Enterprise). | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- @@ -675,7 +675,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -1040,7 +1040,7 @@ kvSecretBackendV2.KvSecretBackendV2Config( | mount | str | Path where KV-V2 engine is mounted. | | cas_required | typing.Union[bool, cdktf.IResolvable] | If true, all keys will require the cas parameter to be set on all write requests. | | delete_version_after | typing.Union[int, float] | If set, specifies the length of time before a version is deleted. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | max_versions | typing.Union[int, float] | The number of versions to keep per key. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1126,7 +1126,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -1140,7 +1140,7 @@ cas_required: typing.Union[bool, IResolvable] If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -1154,7 +1154,7 @@ delete_version_after: typing.Union[int, float] If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -1166,7 +1166,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ max_versions: typing.Union[int, float] The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1197,7 +1197,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretBackendV2.typescript.md b/docs/kvSecretBackendV2.typescript.md index 2e76afb9..7f67281e 100644 --- a/docs/kvSecretBackendV2.typescript.md +++ b/docs/kvSecretBackendV2.typescript.md @@ -4,7 +4,7 @@ ### KvSecretBackendV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2 vault_kv_secret_backend_v2}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the KvSecretBackendV2 to impor The id of the existing KvSecretBackendV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#import import section} in the documentation of this resource for the id to use --- @@ -853,7 +853,7 @@ const kvSecretBackendV2Config: kvSecretBackendV2.KvSecretBackendV2Config = { ... | mount | string | Path where KV-V2 engine is mounted. | | casRequired | boolean \| cdktf.IResolvable | If true, all keys will require the cas parameter to be set on all write requests. | | deleteVersionAfter | number | If set, specifies the length of time before a version is deleted. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. | | maxVersions | number | The number of versions to keep per key. | | namespace | string | Target namespace. (requires Enterprise). | @@ -939,7 +939,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#mount KvSecretBackendV2#mount} --- @@ -953,7 +953,7 @@ public readonly casRequired: boolean | IResolvable; If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#cas_required KvSecretBackendV2#cas_required} --- @@ -967,7 +967,7 @@ public readonly deleteVersionAfter: number; If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#delete_version_after KvSecretBackendV2#delete_version_after} --- @@ -979,7 +979,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#id KvSecretBackendV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -996,7 +996,7 @@ public readonly maxVersions: number; The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#max_versions KvSecretBackendV2#max_versions} --- @@ -1010,7 +1010,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_backend_v2#namespace KvSecretBackendV2#namespace} --- diff --git a/docs/kvSecretV2.csharp.md b/docs/kvSecretV2.csharp.md index 67c3bee6..52e503dc 100644 --- a/docs/kvSecretV2.csharp.md +++ b/docs/kvSecretV2.csharp.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1023,7 +1023,7 @@ new KvSecretV2Config { | CustomMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | DeleteAllVersions | object | If set to true, permanently deletes all versions for the specified key. | | DisableRead | object | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Options | System.Collections.Generic.IDictionary | An object that holds option settings. | @@ -1109,7 +1109,7 @@ public string DataJson { get; set; } JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1123,7 +1123,7 @@ public string Mount { get; set; } Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1139,7 +1139,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1155,7 +1155,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1169,7 +1169,7 @@ public KvSecretV2CustomMetadata CustomMetadata { get; set; } custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1183,7 +1183,7 @@ public object DeleteAllVersions { get; set; } If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1197,7 +1197,7 @@ public object DisableRead { get; set; } If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1209,7 +1209,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1240,7 +1240,7 @@ public System.Collections.Generic.IDictionary Options { get; set An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1280,7 +1280,7 @@ public object CasRequired { get; set; } If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1294,7 +1294,7 @@ public System.Collections.Generic.IDictionary Data { get; set; } A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1308,7 +1308,7 @@ public double DeleteVersionAfter { get; set; } If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1322,7 +1322,7 @@ public double MaxVersions { get; set; } The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.go.md b/docs/kvSecretV2.go.md index 6881bfd3..9fabf4d6 100644 --- a/docs/kvSecretV2.go.md +++ b/docs/kvSecretV2.go.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1023,7 +1023,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/kvsecretv2" | CustomMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | DeleteAllVersions | interface{} | If set to true, permanently deletes all versions for the specified key. | | DisableRead | interface{} | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Options | *map[string]*string | An object that holds option settings. | @@ -1109,7 +1109,7 @@ DataJson *string JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1123,7 +1123,7 @@ Mount *string Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1139,7 +1139,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1155,7 +1155,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1169,7 +1169,7 @@ CustomMetadata KvSecretV2CustomMetadata custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1183,7 +1183,7 @@ DeleteAllVersions interface{} If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1197,7 +1197,7 @@ DisableRead interface{} If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1209,7 +1209,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1226,7 +1226,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1240,7 +1240,7 @@ Options *map[string]*string An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1280,7 +1280,7 @@ CasRequired interface{} If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1294,7 +1294,7 @@ Data *map[string]*string A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1308,7 +1308,7 @@ DeleteVersionAfter *f64 If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1322,7 +1322,7 @@ MaxVersions *f64 The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.java.md b/docs/kvSecretV2.java.md index 163bb6ba..7fd762f5 100644 --- a/docs/kvSecretV2.java.md +++ b/docs/kvSecretV2.java.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -56,7 +56,7 @@ KvSecretV2.Builder.create(Construct scope, java.lang.String id) | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | options | java.util.Map | An object that holds option settings. | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -150,7 +150,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -162,7 +162,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -182,7 +182,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -192,7 +192,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -213,7 +213,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -223,7 +223,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -712,7 +712,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1212,7 +1212,7 @@ KvSecretV2Config.builder() | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | options | java.util.Map | An object that holds option settings. | @@ -1298,7 +1298,7 @@ public java.lang.String getDataJson(); JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1312,7 +1312,7 @@ public java.lang.String getMount(); Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1328,7 +1328,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1344,7 +1344,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1358,7 +1358,7 @@ public KvSecretV2CustomMetadata getCustomMetadata(); custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1372,7 +1372,7 @@ public java.lang.Object getDeleteAllVersions(); If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1386,7 +1386,7 @@ public java.lang.Object getDisableRead(); If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1398,7 +1398,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1415,7 +1415,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1429,7 +1429,7 @@ public java.util.Map getOptions(); An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1470,7 +1470,7 @@ public java.lang.Object getCasRequired(); If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1484,7 +1484,7 @@ public java.util.Map getData(); A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1498,7 +1498,7 @@ public java.lang.Number getDeleteVersionAfter(); If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1512,7 +1512,7 @@ public java.lang.Number getMaxVersions(); The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.python.md b/docs/kvSecretV2.python.md index 85fb85e5..bc680d53 100644 --- a/docs/kvSecretV2.python.md +++ b/docs/kvSecretV2.python.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -52,7 +52,7 @@ kvSecretV2.KvSecretV2( | custom_metadata | KvSecretV2CustomMetadata | custom_metadata block. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | If set to true, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | options | typing.Mapping[str] | An object that holds option settings. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -146,7 +146,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -158,7 +158,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -178,7 +178,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -188,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -209,7 +209,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -603,7 +603,7 @@ def put_custom_metadata( If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -613,7 +613,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -623,7 +623,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -633,7 +633,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- @@ -793,7 +793,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1287,7 +1287,7 @@ kvSecretV2.KvSecretV2Config( | custom_metadata | KvSecretV2CustomMetadata | custom_metadata block. | | delete_all_versions | typing.Union[bool, cdktf.IResolvable] | If set to true, permanently deletes all versions for the specified key. | | disable_read | typing.Union[bool, cdktf.IResolvable] | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | str | Target namespace. (requires Enterprise). | | options | typing.Mapping[str] | An object that holds option settings. | @@ -1373,7 +1373,7 @@ data_json: str JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1387,7 +1387,7 @@ mount: str Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1403,7 +1403,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1419,7 +1419,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1433,7 +1433,7 @@ custom_metadata: KvSecretV2CustomMetadata custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1447,7 +1447,7 @@ delete_all_versions: typing.Union[bool, IResolvable] If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1461,7 +1461,7 @@ disable_read: typing.Union[bool, IResolvable] If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1473,7 +1473,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1490,7 +1490,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1504,7 +1504,7 @@ options: typing.Mapping[str] An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1544,7 +1544,7 @@ cas_required: typing.Union[bool, IResolvable] If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1558,7 +1558,7 @@ data: typing.Mapping[str] A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1572,7 +1572,7 @@ delete_version_after: typing.Union[int, float] If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1586,7 +1586,7 @@ max_versions: typing.Union[int, float] The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/kvSecretV2.typescript.md b/docs/kvSecretV2.typescript.md index 256ffaa7..6c7b5214 100644 --- a/docs/kvSecretV2.typescript.md +++ b/docs/kvSecretV2.typescript.md @@ -4,7 +4,7 @@ ### KvSecretV2 -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2 vault_kv_secret_v2}. #### Initializers @@ -529,7 +529,7 @@ The construct id used in the generated config for the KvSecretV2 to import. The id of the existing KvSecretV2 that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#import import section} in the documentation of this resource for the id to use --- @@ -1005,7 +1005,7 @@ const kvSecretV2Config: kvSecretV2.KvSecretV2Config = { ... } | customMetadata | KvSecretV2CustomMetadata | custom_metadata block. | | deleteAllVersions | boolean \| cdktf.IResolvable | If set to true, permanently deletes all versions for the specified key. | | disableRead | boolean \| cdktf.IResolvable | If set to true, disables reading secret from Vault; note: drift won't be detected. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. | | namespace | string | Target namespace. (requires Enterprise). | | options | {[ key: string ]: string} | An object that holds option settings. | @@ -1091,7 +1091,7 @@ public readonly dataJson: string; JSON-encoded secret data to write. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data_json KvSecretV2#data_json} --- @@ -1105,7 +1105,7 @@ public readonly mount: string; Path where KV-V2 engine is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#mount KvSecretV2#mount} --- @@ -1121,7 +1121,7 @@ Full name of the secret. For a nested secret, the name is the nested path excluding the mount and data prefix. For example, for a secret at 'kvv2/data/foo/bar/baz', the name is 'foo/bar/baz' -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#name KvSecretV2#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#name KvSecretV2#name} --- @@ -1137,7 +1137,7 @@ This flag is required if cas_required is set to true on either the secret or the In order for a write to be successful, cas must be set to the current version of the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas KvSecretV2#cas} --- @@ -1151,7 +1151,7 @@ public readonly customMetadata: KvSecretV2CustomMetadata; custom_metadata block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#custom_metadata KvSecretV2#custom_metadata} --- @@ -1165,7 +1165,7 @@ public readonly deleteAllVersions: boolean | IResolvable; If set to true, permanently deletes all versions for the specified key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_all_versions KvSecretV2#delete_all_versions} --- @@ -1179,7 +1179,7 @@ public readonly disableRead: boolean | IResolvable; If set to true, disables reading secret from Vault; note: drift won't be detected. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#disable_read KvSecretV2#disable_read} --- @@ -1191,7 +1191,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#id KvSecretV2#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1208,7 +1208,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#namespace KvSecretV2#namespace} --- @@ -1222,7 +1222,7 @@ public readonly options: {[ key: string ]: string}; An object that holds option settings. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#options KvSecretV2#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#options KvSecretV2#options} --- @@ -1257,7 +1257,7 @@ public readonly casRequired: boolean | IResolvable; If true, all keys will require the cas parameter to be set on all write requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#cas_required KvSecretV2#cas_required} --- @@ -1271,7 +1271,7 @@ public readonly data: {[ key: string ]: string}; A map of arbitrary string to string valued user-provided metadata meant to describe the secret. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#data KvSecretV2#data} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#data KvSecretV2#data} --- @@ -1285,7 +1285,7 @@ public readonly deleteVersionAfter: number; If set, specifies the length of time before a version is deleted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#delete_version_after KvSecretV2#delete_version_after} --- @@ -1299,7 +1299,7 @@ public readonly maxVersions: number; The number of versions to keep per key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/kv_secret_v2#max_versions KvSecretV2#max_versions} --- diff --git a/docs/ldapAuthBackend.csharp.md b/docs/ldapAuthBackend.csharp.md index 6b728040..93c50e3f 100644 --- a/docs/ldapAuthBackend.csharp.md +++ b/docs/ldapAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | ResetCertificate | *No description.* | | ResetClientTlsCert | *No description.* | | ResetClientTlsKey | *No description.* | +| ResetConnectionTimeout | *No description.* | | ResetDenyNullBind | *No description.* | | ResetDescription | *No description.* | | ResetDisableRemount | *No description.* | @@ -437,6 +438,12 @@ private void ResetClientTlsCert() private void ResetClientTlsKey() ``` +##### `ResetConnectionTimeout` + +```csharp +private void ResetConnectionTimeout() +``` + ##### `ResetDenyNullBind` ```csharp @@ -726,7 +733,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -763,6 +770,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | CertificateInput | string | *No description.* | | ClientTlsCertInput | string | *No description.* | | ClientTlsKeyInput | string | *No description.* | +| ConnectionTimeoutInput | double | *No description.* | | DenyNullBindInput | object | *No description.* | | DescriptionInput | string | *No description.* | | DisableRemountInput | object | *No description.* | @@ -801,6 +809,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Certificate | string | *No description.* | | ClientTlsCert | string | *No description.* | | ClientTlsKey | string | *No description.* | +| ConnectionTimeout | double | *No description.* | | DenyNullBind | object | *No description.* | | Description | string | *No description.* | | DisableRemount | object | *No description.* | @@ -1048,6 +1057,16 @@ public string ClientTlsKeyInput { get; } --- +##### `ConnectionTimeoutInput`Optional + +```csharp +public double ConnectionTimeoutInput { get; } +``` + +- *Type:* double + +--- + ##### `DenyNullBindInput`Optional ```csharp @@ -1428,6 +1447,16 @@ public string ClientTlsKey { get; } --- +##### `ConnectionTimeout`Required + +```csharp +public double ConnectionTimeout { get; } +``` + +- *Type:* double + +--- + ##### `DenyNullBind`Required ```csharp @@ -1790,6 +1819,7 @@ new LdapAuthBackendConfig { string Certificate = null, string ClientTlsCert = null, string ClientTlsKey = null, + double ConnectionTimeout = null, object DenyNullBind = null, string Description = null, object DisableRemount = null, @@ -1835,29 +1865,30 @@ new LdapAuthBackendConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| Binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| Bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| CaseSensitiveNames | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| ClientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| ClientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| DenyNullBind | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| Url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| Binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| Bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| CaseSensitiveNames | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| Certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| ClientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| ClientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| ConnectionTimeout | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| DenyNullBind | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| Description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Discoverdn | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| Groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| Groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| Groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| InsecureTls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| Discoverdn | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| Groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| Groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| Groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| InsecureTls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | Local | object | Specifies if the auth method is local only. | -| MaxPageSize | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| MaxPageSize | double | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| Starttls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| TlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| TlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| Path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| Starttls | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| TlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| TlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | TokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | double | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | double | The maximum lifetime of the generated token. | @@ -1867,12 +1898,12 @@ new LdapAuthBackendConfig { | TokenPolicies | string[] | Generated Token's Policies. | | TokenTtl | double | The initial ttl of the token to generate in seconds. | | TokenType | string | The type of token to generate, service or batch. | -| Upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| Userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| Userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| Userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| Upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| Userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| Userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| Userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | UsernameAsAlias | object | Force the auth method to use the username passed by the user as the alias name. | -| UseTokenGroups | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| UseTokenGroups | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1954,7 +1985,7 @@ public string Url { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1966,7 +1997,7 @@ public string Binddn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1978,7 +2009,7 @@ public string Bindpass { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1990,7 +2021,7 @@ public object CaseSensitiveNames { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2002,7 +2033,7 @@ public string Certificate { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2014,7 +2045,7 @@ public string ClientTlsCert { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2026,7 +2057,19 @@ public string ClientTlsKey { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `ConnectionTimeout`Optional + +```csharp +public double ConnectionTimeout { get; set; } +``` + +- *Type:* double + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -2038,7 +2081,7 @@ public object DenyNullBind { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2050,7 +2093,7 @@ public string Description { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2064,7 +2107,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2076,7 +2119,7 @@ public object Discoverdn { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2088,7 +2131,7 @@ public string Groupattr { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2100,7 +2143,7 @@ public string Groupdn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2112,7 +2155,7 @@ public string Groupfilter { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2124,7 +2167,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2139,7 +2182,7 @@ public object InsecureTls { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2153,7 +2196,7 @@ public object Local { get; set; } Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2165,7 +2208,7 @@ public double MaxPageSize { get; set; } - *Type:* double -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2179,7 +2222,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2191,7 +2234,7 @@ public string Path { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2203,7 +2246,7 @@ public object Starttls { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2215,7 +2258,7 @@ public string TlsMaxVersion { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2227,7 +2270,7 @@ public string TlsMinVersion { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2241,7 +2284,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2255,7 +2298,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2269,7 +2312,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2283,7 +2326,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2297,7 +2340,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2311,7 +2354,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2325,7 +2368,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2339,7 +2382,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2353,7 +2396,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2365,7 +2408,7 @@ public string Upndomain { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2377,7 +2420,7 @@ public string Userattr { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2389,7 +2432,7 @@ public string Userdn { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2401,7 +2444,7 @@ public string Userfilter { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2415,7 +2458,7 @@ public object UsernameAsAlias { get; set; } Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2427,7 +2470,7 @@ public object UseTokenGroups { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.go.md b/docs/ldapAuthBackend.go.md index 55159f3d..5fbc99c6 100644 --- a/docs/ldapAuthBackend.go.md +++ b/docs/ldapAuthBackend.go.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | ResetCertificate | *No description.* | | ResetClientTlsCert | *No description.* | | ResetClientTlsKey | *No description.* | +| ResetConnectionTimeout | *No description.* | | ResetDenyNullBind | *No description.* | | ResetDescription | *No description.* | | ResetDisableRemount | *No description.* | @@ -437,6 +438,12 @@ func ResetClientTlsCert() func ResetClientTlsKey() ``` +##### `ResetConnectionTimeout` + +```go +func ResetConnectionTimeout() +``` + ##### `ResetDenyNullBind` ```go @@ -726,7 +733,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -763,6 +770,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | CertificateInput | *string | *No description.* | | ClientTlsCertInput | *string | *No description.* | | ClientTlsKeyInput | *string | *No description.* | +| ConnectionTimeoutInput | *f64 | *No description.* | | DenyNullBindInput | interface{} | *No description.* | | DescriptionInput | *string | *No description.* | | DisableRemountInput | interface{} | *No description.* | @@ -801,6 +809,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | Certificate | *string | *No description.* | | ClientTlsCert | *string | *No description.* | | ClientTlsKey | *string | *No description.* | +| ConnectionTimeout | *f64 | *No description.* | | DenyNullBind | interface{} | *No description.* | | Description | *string | *No description.* | | DisableRemount | interface{} | *No description.* | @@ -1048,6 +1057,16 @@ func ClientTlsKeyInput() *string --- +##### `ConnectionTimeoutInput`Optional + +```go +func ConnectionTimeoutInput() *f64 +``` + +- *Type:* *f64 + +--- + ##### `DenyNullBindInput`Optional ```go @@ -1428,6 +1447,16 @@ func ClientTlsKey() *string --- +##### `ConnectionTimeout`Required + +```go +func ConnectionTimeout() *f64 +``` + +- *Type:* *f64 + +--- + ##### `DenyNullBind`Required ```go @@ -1790,6 +1819,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" Certificate: *string, ClientTlsCert: *string, ClientTlsKey: *string, + ConnectionTimeout: *f64, DenyNullBind: interface{}, Description: *string, DisableRemount: interface{}, @@ -1835,29 +1865,30 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Url | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| Binddn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| Bindpass | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| CaseSensitiveNames | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| ClientTlsCert | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| ClientTlsKey | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| DenyNullBind | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| Url | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| Binddn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| Bindpass | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| CaseSensitiveNames | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| Certificate | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| ClientTlsCert | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| ClientTlsKey | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| ConnectionTimeout | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| DenyNullBind | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| Description | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Discoverdn | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| Groupattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| Groupdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| Groupfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| InsecureTls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| Discoverdn | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| Groupattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| Groupdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| Groupfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| InsecureTls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | Local | interface{} | Specifies if the auth method is local only. | -| MaxPageSize | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| MaxPageSize | *f64 | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| Starttls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| TlsMaxVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| TlsMinVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| Path | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| Starttls | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| TlsMaxVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| TlsMinVersion | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | TokenBoundCidrs | *[]*string | Specifies the blocks of IP addresses which are allowed to use the generated token. | | TokenExplicitMaxTtl | *f64 | Generated Token's Explicit Maximum TTL in seconds. | | TokenMaxTtl | *f64 | The maximum lifetime of the generated token. | @@ -1867,12 +1898,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackend" | TokenPolicies | *[]*string | Generated Token's Policies. | | TokenTtl | *f64 | The initial ttl of the token to generate in seconds. | | TokenType | *string | The type of token to generate, service or batch. | -| Upndomain | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| Userattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| Userdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| Userfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| Upndomain | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| Userattr | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| Userdn | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| Userfilter | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | UsernameAsAlias | interface{} | Force the auth method to use the username passed by the user as the alias name. | -| UseTokenGroups | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| UseTokenGroups | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1954,7 +1985,7 @@ Url *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1966,7 +1997,7 @@ Binddn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1978,7 +2009,7 @@ Bindpass *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1990,7 +2021,7 @@ CaseSensitiveNames interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2002,7 +2033,7 @@ Certificate *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2014,7 +2045,7 @@ ClientTlsCert *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2026,7 +2057,19 @@ ClientTlsKey *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `ConnectionTimeout`Optional + +```go +ConnectionTimeout *f64 +``` + +- *Type:* *f64 + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -2038,7 +2081,7 @@ DenyNullBind interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2050,7 +2093,7 @@ Description *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2064,7 +2107,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2076,7 +2119,7 @@ Discoverdn interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2088,7 +2131,7 @@ Groupattr *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2100,7 +2143,7 @@ Groupdn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2112,7 +2155,7 @@ Groupfilter *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2124,7 +2167,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2139,7 +2182,7 @@ InsecureTls interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2153,7 +2196,7 @@ Local interface{} Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2165,7 +2208,7 @@ MaxPageSize *f64 - *Type:* *f64 -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2179,7 +2222,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2191,7 +2234,7 @@ Path *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2203,7 +2246,7 @@ Starttls interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2215,7 +2258,7 @@ TlsMaxVersion *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2227,7 +2270,7 @@ TlsMinVersion *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2241,7 +2284,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2255,7 +2298,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2269,7 +2312,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2283,7 +2326,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2297,7 +2340,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2311,7 +2354,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2325,7 +2368,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2339,7 +2382,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2353,7 +2396,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2365,7 +2408,7 @@ Upndomain *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2377,7 +2420,7 @@ Userattr *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2389,7 +2432,7 @@ Userdn *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2401,7 +2444,7 @@ Userfilter *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2415,7 +2458,7 @@ UsernameAsAlias interface{} Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2427,7 +2470,7 @@ UseTokenGroups interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.java.md b/docs/ldapAuthBackend.java.md index 9502b1b0..0f1e91df 100644 --- a/docs/ldapAuthBackend.java.md +++ b/docs/ldapAuthBackend.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -31,6 +31,7 @@ LdapAuthBackend.Builder.create(Construct scope, java.lang.String id) // .certificate(java.lang.String) // .clientTlsCert(java.lang.String) // .clientTlsKey(java.lang.String) +// .connectionTimeout(java.lang.Number) // .denyNullBind(java.lang.Boolean) // .denyNullBind(IResolvable) // .description(java.lang.String) @@ -85,29 +86,30 @@ LdapAuthBackend.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| connectionTimeout | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -117,12 +119,12 @@ LdapAuthBackend.Builder.create(Construct scope, java.lang.String id) | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -190,7 +192,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -198,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -206,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -214,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -222,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -230,7 +232,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -238,7 +240,15 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `connectionTimeout`Optional + +- *Type:* java.lang.Number + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -246,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -254,7 +264,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -264,7 +274,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -272,7 +282,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -280,7 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -288,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -296,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -304,7 +314,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -315,7 +325,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -325,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -333,7 +343,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -343,7 +353,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -351,7 +361,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -359,7 +369,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -367,7 +377,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -375,7 +385,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -385,7 +395,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -395,7 +405,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -405,7 +415,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -415,7 +425,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -425,7 +435,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -435,7 +445,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -445,7 +455,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -455,7 +465,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -465,7 +475,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -473,7 +483,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -481,7 +491,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -489,7 +499,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -497,7 +507,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -507,7 +517,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -515,7 +525,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- @@ -552,6 +562,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | resetCertificate | *No description.* | | resetClientTlsCert | *No description.* | | resetClientTlsKey | *No description.* | +| resetConnectionTimeout | *No description.* | | resetDenyNullBind | *No description.* | | resetDescription | *No description.* | | resetDisableRemount | *No description.* | @@ -912,6 +923,12 @@ public void resetClientTlsCert() public void resetClientTlsKey() ``` +##### `resetConnectionTimeout` + +```java +public void resetConnectionTimeout() +``` + ##### `resetDenyNullBind` ```java @@ -1201,7 +1218,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1238,6 +1255,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificateInput | java.lang.String | *No description.* | | clientTlsCertInput | java.lang.String | *No description.* | | clientTlsKeyInput | java.lang.String | *No description.* | +| connectionTimeoutInput | java.lang.Number | *No description.* | | denyNullBindInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | descriptionInput | java.lang.String | *No description.* | | disableRemountInput | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1276,6 +1294,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificate | java.lang.String | *No description.* | | clientTlsCert | java.lang.String | *No description.* | | clientTlsKey | java.lang.String | *No description.* | +| connectionTimeout | java.lang.Number | *No description.* | | denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | | description | java.lang.String | *No description.* | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | *No description.* | @@ -1523,6 +1542,16 @@ public java.lang.String getClientTlsKeyInput(); --- +##### `connectionTimeoutInput`Optional + +```java +public java.lang.Number getConnectionTimeoutInput(); +``` + +- *Type:* java.lang.Number + +--- + ##### `denyNullBindInput`Optional ```java @@ -1903,6 +1932,16 @@ public java.lang.String getClientTlsKey(); --- +##### `connectionTimeout`Required + +```java +public java.lang.Number getConnectionTimeout(); +``` + +- *Type:* java.lang.Number + +--- + ##### `denyNullBind`Required ```java @@ -2270,6 +2309,7 @@ LdapAuthBackendConfig.builder() // .certificate(java.lang.String) // .clientTlsCert(java.lang.String) // .clientTlsKey(java.lang.String) +// .connectionTimeout(java.lang.Number) // .denyNullBind(java.lang.Boolean) // .denyNullBind(IResolvable) // .description(java.lang.String) @@ -2324,29 +2364,30 @@ LdapAuthBackendConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| connectionTimeout | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| denyNullBind | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | java.lang.Number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | java.util.List | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | java.lang.Number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | java.lang.Number | The maximum lifetime of the generated token. | @@ -2356,12 +2397,12 @@ LdapAuthBackendConfig.builder() | tokenPolicies | java.util.List | Generated Token's Policies. | | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | -| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -2443,7 +2484,7 @@ public java.lang.String getUrl(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -2455,7 +2496,7 @@ public java.lang.String getBinddn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -2467,7 +2508,7 @@ public java.lang.String getBindpass(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -2479,7 +2520,7 @@ public java.lang.Object getCaseSensitiveNames(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2491,7 +2532,7 @@ public java.lang.String getCertificate(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2503,7 +2544,7 @@ public java.lang.String getClientTlsCert(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2515,7 +2556,19 @@ public java.lang.String getClientTlsKey(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `connectionTimeout`Optional + +```java +public java.lang.Number getConnectionTimeout(); +``` + +- *Type:* java.lang.Number + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -2527,7 +2580,7 @@ public java.lang.Object getDenyNullBind(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2539,7 +2592,7 @@ public java.lang.String getDescription(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2553,7 +2606,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2565,7 +2618,7 @@ public java.lang.Object getDiscoverdn(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2577,7 +2630,7 @@ public java.lang.String getGroupattr(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2589,7 +2642,7 @@ public java.lang.String getGroupdn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2601,7 +2654,7 @@ public java.lang.String getGroupfilter(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2613,7 +2666,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2628,7 +2681,7 @@ public java.lang.Object getInsecureTls(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2642,7 +2695,7 @@ public java.lang.Object getLocal(); Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2654,7 +2707,7 @@ public java.lang.Number getMaxPageSize(); - *Type:* java.lang.Number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2668,7 +2721,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2680,7 +2733,7 @@ public java.lang.String getPath(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2692,7 +2745,7 @@ public java.lang.Object getStarttls(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2704,7 +2757,7 @@ public java.lang.String getTlsMaxVersion(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2716,7 +2769,7 @@ public java.lang.String getTlsMinVersion(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2730,7 +2783,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2744,7 +2797,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2758,7 +2811,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2772,7 +2825,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2786,7 +2839,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2800,7 +2853,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2814,7 +2867,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2828,7 +2881,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2842,7 +2895,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2854,7 +2907,7 @@ public java.lang.String getUpndomain(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2866,7 +2919,7 @@ public java.lang.String getUserattr(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2878,7 +2931,7 @@ public java.lang.String getUserdn(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2890,7 +2943,7 @@ public java.lang.String getUserfilter(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2904,7 +2957,7 @@ public java.lang.Object getUsernameAsAlias(); Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2916,7 +2969,7 @@ public java.lang.Object getUseTokenGroups(); - *Type:* java.lang.Boolean OR com.hashicorp.cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.python.md b/docs/ldapAuthBackend.python.md index 4a9368b3..c6b37a0a 100644 --- a/docs/ldapAuthBackend.python.md +++ b/docs/ldapAuthBackend.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -28,6 +28,7 @@ ldapAuthBackend.LdapAuthBackend( certificate: str = None, client_tls_cert: str = None, client_tls_key: str = None, + connection_timeout: typing.Union[int, float] = None, deny_null_bind: typing.Union[bool, IResolvable] = None, description: str = None, disable_remount: typing.Union[bool, IResolvable] = None, @@ -73,29 +74,30 @@ ldapAuthBackend.LdapAuthBackend( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| connection_timeout | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | -| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -105,12 +107,12 @@ ldapAuthBackend.LdapAuthBackend( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | username_as_alias | typing.Union[bool, cdktf.IResolvable] | Force the auth method to use the username passed by the user as the alias name. | -| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -178,7 +180,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -186,7 +188,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -194,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -202,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -210,7 +212,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -218,7 +220,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -226,7 +228,15 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `connection_timeout`Optional + +- *Type:* typing.Union[int, float] + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -234,7 +244,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -242,7 +252,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -252,7 +262,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -260,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -268,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -276,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -284,7 +294,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -292,7 +302,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -303,7 +313,7 @@ If you experience problems setting this value it might not be settable. Please t - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -313,7 +323,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -321,7 +331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -331,7 +341,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -339,7 +349,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -347,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -355,7 +365,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -363,7 +373,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -373,7 +383,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -383,7 +393,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -393,7 +403,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -403,7 +413,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -413,7 +423,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -423,7 +433,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -433,7 +443,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -443,7 +453,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -453,7 +463,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -461,7 +471,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -469,7 +479,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -477,7 +487,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -485,7 +495,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -495,7 +505,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -503,7 +513,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- @@ -540,6 +550,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi | reset_certificate | *No description.* | | reset_client_tls_cert | *No description.* | | reset_client_tls_key | *No description.* | +| reset_connection_timeout | *No description.* | | reset_deny_null_bind | *No description.* | | reset_description | *No description.* | | reset_disable_remount | *No description.* | @@ -935,6 +946,12 @@ def reset_client_tls_cert() -> None def reset_client_tls_key() -> None ``` +##### `reset_connection_timeout` + +```python +def reset_connection_timeout() -> None +``` + ##### `reset_deny_null_bind` ```python @@ -1235,7 +1252,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1272,6 +1289,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificate_input | str | *No description.* | | client_tls_cert_input | str | *No description.* | | client_tls_key_input | str | *No description.* | +| connection_timeout_input | typing.Union[int, float] | *No description.* | | deny_null_bind_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | | description_input | str | *No description.* | | disable_remount_input | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1310,6 +1328,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificate | str | *No description.* | | client_tls_cert | str | *No description.* | | client_tls_key | str | *No description.* | +| connection_timeout | typing.Union[int, float] | *No description.* | | deny_null_bind | typing.Union[bool, cdktf.IResolvable] | *No description.* | | description | str | *No description.* | | disable_remount | typing.Union[bool, cdktf.IResolvable] | *No description.* | @@ -1557,6 +1576,16 @@ client_tls_key_input: str --- +##### `connection_timeout_input`Optional + +```python +connection_timeout_input: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `deny_null_bind_input`Optional ```python @@ -1937,6 +1966,16 @@ client_tls_key: str --- +##### `connection_timeout`Required + +```python +connection_timeout: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +--- + ##### `deny_null_bind`Required ```python @@ -2299,6 +2338,7 @@ ldapAuthBackend.LdapAuthBackendConfig( certificate: str = None, client_tls_cert: str = None, client_tls_key: str = None, + connection_timeout: typing.Union[int, float] = None, deny_null_bind: typing.Union[bool, IResolvable] = None, description: str = None, disable_remount: typing.Union[bool, IResolvable] = None, @@ -2344,29 +2384,30 @@ ldapAuthBackend.LdapAuthBackendConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| case_sensitive_names | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| client_tls_cert | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| client_tls_key | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| connection_timeout | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| deny_null_bind | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecure_tls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | typing.Union[bool, cdktf.IResolvable] | Specifies if the auth method is local only. | -| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| max_page_size | typing.Union[int, float] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | str | Target namespace. (requires Enterprise). | -| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tls_max_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tls_min_version | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | token_bound_cidrs | typing.List[str] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | token_explicit_max_ttl | typing.Union[int, float] | Generated Token's Explicit Maximum TTL in seconds. | | token_max_ttl | typing.Union[int, float] | The maximum lifetime of the generated token. | @@ -2376,12 +2417,12 @@ ldapAuthBackend.LdapAuthBackendConfig( | token_policies | typing.List[str] | Generated Token's Policies. | | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | -| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | username_as_alias | typing.Union[bool, cdktf.IResolvable] | Force the auth method to use the username passed by the user as the alias name. | -| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| use_token_groups | typing.Union[bool, cdktf.IResolvable] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -2463,7 +2504,7 @@ url: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -2475,7 +2516,7 @@ binddn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -2487,7 +2528,7 @@ bindpass: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -2499,7 +2540,7 @@ case_sensitive_names: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -2511,7 +2552,7 @@ certificate: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -2523,7 +2564,7 @@ client_tls_cert: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -2535,7 +2576,19 @@ client_tls_key: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `connection_timeout`Optional + +```python +connection_timeout: typing.Union[int, float] +``` + +- *Type:* typing.Union[int, float] + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -2547,7 +2600,7 @@ deny_null_bind: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2559,7 +2612,7 @@ description: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2573,7 +2626,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2585,7 +2638,7 @@ discoverdn: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2597,7 +2650,7 @@ groupattr: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2609,7 +2662,7 @@ groupdn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2621,7 +2674,7 @@ groupfilter: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2633,7 +2686,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2648,7 +2701,7 @@ insecure_tls: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2662,7 +2715,7 @@ local: typing.Union[bool, IResolvable] Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2674,7 +2727,7 @@ max_page_size: typing.Union[int, float] - *Type:* typing.Union[int, float] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2688,7 +2741,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2700,7 +2753,7 @@ path: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2712,7 +2765,7 @@ starttls: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2724,7 +2777,7 @@ tls_max_version: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2736,7 +2789,7 @@ tls_min_version: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2750,7 +2803,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2764,7 +2817,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2778,7 +2831,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2792,7 +2845,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2806,7 +2859,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2820,7 +2873,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2834,7 +2887,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2848,7 +2901,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2862,7 +2915,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2874,7 +2927,7 @@ upndomain: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2886,7 +2939,7 @@ userattr: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2898,7 +2951,7 @@ userdn: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2910,7 +2963,7 @@ userfilter: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2924,7 +2977,7 @@ username_as_alias: typing.Union[bool, IResolvable] Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2936,7 +2989,7 @@ use_token_groups: typing.Union[bool, IResolvable] - *Type:* typing.Union[bool, cdktf.IResolvable] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackend.typescript.md b/docs/ldapAuthBackend.typescript.md index d041c72e..696632ff 100644 --- a/docs/ldapAuthBackend.typescript.md +++ b/docs/ldapAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend vault_ldap_auth_backend}. #### Initializers @@ -79,6 +79,7 @@ Must be unique amongst siblings in the same scope | resetCertificate | *No description.* | | resetClientTlsCert | *No description.* | | resetClientTlsKey | *No description.* | +| resetConnectionTimeout | *No description.* | | resetDenyNullBind | *No description.* | | resetDescription | *No description.* | | resetDisableRemount | *No description.* | @@ -437,6 +438,12 @@ public resetClientTlsCert(): void public resetClientTlsKey(): void ``` +##### `resetConnectionTimeout` + +```typescript +public resetConnectionTimeout(): void +``` + ##### `resetDenyNullBind` ```typescript @@ -726,7 +733,7 @@ The construct id used in the generated config for the LdapAuthBackend to import. The id of the existing LdapAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -763,6 +770,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificateInput | string | *No description.* | | clientTlsCertInput | string | *No description.* | | clientTlsKeyInput | string | *No description.* | +| connectionTimeoutInput | number | *No description.* | | denyNullBindInput | boolean \| cdktf.IResolvable | *No description.* | | descriptionInput | string | *No description.* | | disableRemountInput | boolean \| cdktf.IResolvable | *No description.* | @@ -801,6 +809,7 @@ Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4. | certificate | string | *No description.* | | clientTlsCert | string | *No description.* | | clientTlsKey | string | *No description.* | +| connectionTimeout | number | *No description.* | | denyNullBind | boolean \| cdktf.IResolvable | *No description.* | | description | string | *No description.* | | disableRemount | boolean \| cdktf.IResolvable | *No description.* | @@ -1048,6 +1057,16 @@ public readonly clientTlsKeyInput: string; --- +##### `connectionTimeoutInput`Optional + +```typescript +public readonly connectionTimeoutInput: number; +``` + +- *Type:* number + +--- + ##### `denyNullBindInput`Optional ```typescript @@ -1428,6 +1447,16 @@ public readonly clientTlsKey: string; --- +##### `connectionTimeout`Required + +```typescript +public readonly connectionTimeout: number; +``` + +- *Type:* number + +--- + ##### `denyNullBind`Required ```typescript @@ -1789,29 +1818,30 @@ const ldapAuthBackendConfig: ldapAuthBackend.LdapAuthBackendConfig = { ... } | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | -| binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | -| bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | -| caseSensitiveNames | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | -| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | -| clientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | -| clientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | -| denyNullBind | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | -| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | +| url | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. | +| binddn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. | +| bindpass | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. | +| caseSensitiveNames | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. | +| certificate | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. | +| clientTlsCert | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. | +| clientTlsKey | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. | +| connectionTimeout | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. | +| denyNullBind | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. | +| description | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| discoverdn | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | -| groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | -| groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | -| groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | -| insecureTls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | +| discoverdn | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. | +| groupattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. | +| groupdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. | +| groupfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. | +| insecureTls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. | | local | boolean \| cdktf.IResolvable | Specifies if the auth method is local only. | -| maxPageSize | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | +| maxPageSize | number | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. | | namespace | string | Target namespace. (requires Enterprise). | -| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | -| starttls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | -| tlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | -| tlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | +| path | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. | +| starttls | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. | +| tlsMaxVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. | +| tlsMinVersion | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. | | tokenBoundCidrs | string[] | Specifies the blocks of IP addresses which are allowed to use the generated token. | | tokenExplicitMaxTtl | number | Generated Token's Explicit Maximum TTL in seconds. | | tokenMaxTtl | number | The maximum lifetime of the generated token. | @@ -1821,12 +1851,12 @@ const ldapAuthBackendConfig: ldapAuthBackend.LdapAuthBackendConfig = { ... } | tokenPolicies | string[] | Generated Token's Policies. | | tokenTtl | number | The initial ttl of the token to generate in seconds. | | tokenType | string | The type of token to generate, service or batch. | -| upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | -| userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | -| userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | -| userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | +| upndomain | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. | +| userattr | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. | +| userdn | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. | +| userfilter | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. | | usernameAsAlias | boolean \| cdktf.IResolvable | Force the auth method to use the username passed by the user as the alias name. | -| useTokenGroups | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | +| useTokenGroups | boolean \| cdktf.IResolvable | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. | --- @@ -1908,7 +1938,7 @@ public readonly url: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#url LdapAuthBackend#url}. --- @@ -1920,7 +1950,7 @@ public readonly binddn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#binddn LdapAuthBackend#binddn}. --- @@ -1932,7 +1962,7 @@ public readonly bindpass: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#bindpass LdapAuthBackend#bindpass}. --- @@ -1944,7 +1974,7 @@ public readonly caseSensitiveNames: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#case_sensitive_names LdapAuthBackend#case_sensitive_names}. --- @@ -1956,7 +1986,7 @@ public readonly certificate: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#certificate LdapAuthBackend#certificate}. --- @@ -1968,7 +1998,7 @@ public readonly clientTlsCert: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_cert LdapAuthBackend#client_tls_cert}. --- @@ -1980,7 +2010,19 @@ public readonly clientTlsKey: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#client_tls_key LdapAuthBackend#client_tls_key}. + +--- + +##### `connectionTimeout`Optional + +```typescript +public readonly connectionTimeout: number; +``` + +- *Type:* number + +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#connection_timeout LdapAuthBackend#connection_timeout}. --- @@ -1992,7 +2034,7 @@ public readonly denyNullBind: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#deny_null_bind LdapAuthBackend#deny_null_bind}. --- @@ -2004,7 +2046,7 @@ public readonly description: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#description LdapAuthBackend#description}. --- @@ -2018,7 +2060,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#disable_remount LdapAuthBackend#disable_remount} --- @@ -2030,7 +2072,7 @@ public readonly discoverdn: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#discoverdn LdapAuthBackend#discoverdn}. --- @@ -2042,7 +2084,7 @@ public readonly groupattr: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupattr LdapAuthBackend#groupattr}. --- @@ -2054,7 +2096,7 @@ public readonly groupdn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupdn LdapAuthBackend#groupdn}. --- @@ -2066,7 +2108,7 @@ public readonly groupfilter: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#groupfilter LdapAuthBackend#groupfilter}. --- @@ -2078,7 +2120,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#id LdapAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2093,7 +2135,7 @@ public readonly insecureTls: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#insecure_tls LdapAuthBackend#insecure_tls}. --- @@ -2107,7 +2149,7 @@ public readonly local: boolean | IResolvable; Specifies if the auth method is local only. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#local LdapAuthBackend#local} --- @@ -2119,7 +2161,7 @@ public readonly maxPageSize: number; - *Type:* number -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#max_page_size LdapAuthBackend#max_page_size}. --- @@ -2133,7 +2175,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#namespace LdapAuthBackend#namespace} --- @@ -2145,7 +2187,7 @@ public readonly path: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#path LdapAuthBackend#path}. --- @@ -2157,7 +2199,7 @@ public readonly starttls: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#starttls LdapAuthBackend#starttls}. --- @@ -2169,7 +2211,7 @@ public readonly tlsMaxVersion: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_max_version LdapAuthBackend#tls_max_version}. --- @@ -2181,7 +2223,7 @@ public readonly tlsMinVersion: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#tls_min_version LdapAuthBackend#tls_min_version}. --- @@ -2195,7 +2237,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_bound_cidrs LdapAuthBackend#token_bound_cidrs} --- @@ -2209,7 +2251,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_explicit_max_ttl LdapAuthBackend#token_explicit_max_ttl} --- @@ -2223,7 +2265,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_max_ttl LdapAuthBackend#token_max_ttl} --- @@ -2237,7 +2279,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_no_default_policy LdapAuthBackend#token_no_default_policy} --- @@ -2251,7 +2293,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_num_uses LdapAuthBackend#token_num_uses} --- @@ -2265,7 +2307,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_period LdapAuthBackend#token_period} --- @@ -2279,7 +2321,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_policies LdapAuthBackend#token_policies} --- @@ -2293,7 +2335,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_ttl LdapAuthBackend#token_ttl} --- @@ -2307,7 +2349,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#token_type LdapAuthBackend#token_type} --- @@ -2319,7 +2361,7 @@ public readonly upndomain: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#upndomain LdapAuthBackend#upndomain}. --- @@ -2331,7 +2373,7 @@ public readonly userattr: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userattr LdapAuthBackend#userattr}. --- @@ -2343,7 +2385,7 @@ public readonly userdn: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userdn LdapAuthBackend#userdn}. --- @@ -2355,7 +2397,7 @@ public readonly userfilter: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#userfilter LdapAuthBackend#userfilter}. --- @@ -2369,7 +2411,7 @@ public readonly usernameAsAlias: boolean | IResolvable; Force the auth method to use the username passed by the user as the alias name. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#username_as_alias LdapAuthBackend#username_as_alias} --- @@ -2381,7 +2423,7 @@ public readonly useTokenGroups: boolean | IResolvable; - *Type:* boolean | cdktf.IResolvable -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend#use_token_groups LdapAuthBackend#use_token_groups}. --- diff --git a/docs/ldapAuthBackendGroup.csharp.md b/docs/ldapAuthBackendGroup.csharp.md index 613dcc00..ed0f0ab2 100644 --- a/docs/ldapAuthBackendGroup.csharp.md +++ b/docs/ldapAuthBackendGroup.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -834,11 +834,11 @@ new LdapAuthBackendGroupConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| Groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -920,7 +920,7 @@ public string Groupname { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -932,7 +932,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -944,7 +944,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -973,7 +973,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.go.md b/docs/ldapAuthBackendGroup.go.md index 70f0cabb..2da6fc99 100644 --- a/docs/ldapAuthBackendGroup.go.md +++ b/docs/ldapAuthBackendGroup.go.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -834,11 +834,11 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackendgroup" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Groupname | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| Groupname | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -920,7 +920,7 @@ Groupname *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -932,7 +932,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -944,7 +944,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -961,7 +961,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -973,7 +973,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.java.md b/docs/ldapAuthBackendGroup.java.md index f1275637..55c22961 100644 --- a/docs/ldapAuthBackendGroup.java.md +++ b/docs/ldapAuthBackendGroup.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -42,11 +42,11 @@ LdapAuthBackendGroup.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- @@ -606,7 +606,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -949,11 +949,11 @@ LdapAuthBackendGroupConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -1035,7 +1035,7 @@ public java.lang.String getGroupname(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -1047,7 +1047,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -1059,7 +1059,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -1088,7 +1088,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.python.md b/docs/ldapAuthBackendGroup.python.md index e3bb33ef..11fb2576 100644 --- a/docs/ldapAuthBackendGroup.python.md +++ b/docs/ldapAuthBackendGroup.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -40,11 +40,11 @@ ldapAuthBackendGroup.LdapAuthBackendGroup( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -120,7 +120,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -141,7 +141,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- @@ -650,7 +650,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -989,11 +989,11 @@ ldapAuthBackendGroup.LdapAuthBackendGroupConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -1075,7 +1075,7 @@ groupname: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -1087,7 +1087,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -1099,7 +1099,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1116,7 +1116,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -1128,7 +1128,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendGroup.typescript.md b/docs/ldapAuthBackendGroup.typescript.md index a3a73c13..46341206 100644 --- a/docs/ldapAuthBackendGroup.typescript.md +++ b/docs/ldapAuthBackendGroup.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackendGroup -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group vault_ldap_auth_backend_group}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the LdapAuthBackendGroup to im The id of the existing LdapAuthBackendGroup that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -821,11 +821,11 @@ const ldapAuthBackendGroupConfig: ldapAuthBackendGroup.LdapAuthBackendGroupConfi | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | +| groupname | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. | --- @@ -907,7 +907,7 @@ public readonly groupname: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#groupname LdapAuthBackendGroup#groupname}. --- @@ -919,7 +919,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#backend LdapAuthBackendGroup#backend}. --- @@ -931,7 +931,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#id LdapAuthBackendGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -948,7 +948,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#namespace LdapAuthBackendGroup#namespace} --- @@ -960,7 +960,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_group#policies LdapAuthBackendGroup#policies}. --- diff --git a/docs/ldapAuthBackendUser.csharp.md b/docs/ldapAuthBackendUser.csharp.md index 00028a43..11efe57c 100644 --- a/docs/ldapAuthBackendUser.csharp.md +++ b/docs/ldapAuthBackendUser.csharp.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -864,12 +864,12 @@ new LdapAuthBackendUserConfig { | Lifecycle | HashiCorp.Cdktf.TerraformResourceLifecycle | *No description.* | | Provider | HashiCorp.Cdktf.TerraformProvider | *No description.* | | Provisioners | object[] | *No description.* | -| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| Backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | Namespace | string | Target namespace. (requires Enterprise). | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -951,7 +951,7 @@ public string Username { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -963,7 +963,7 @@ public string Backend { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -975,7 +975,7 @@ public string[] Groups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -987,7 +987,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1016,7 +1016,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.go.md b/docs/ldapAuthBackendUser.go.md index 643ada85..7991047c 100644 --- a/docs/ldapAuthBackendUser.go.md +++ b/docs/ldapAuthBackendUser.go.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -864,12 +864,12 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapauthbackenduser" | Lifecycle | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformResourceLifecycle | *No description.* | | Provider | github.com/hashicorp/terraform-cdk-go/cdktf.TerraformProvider | *No description.* | | Provisioners | *[]interface{} | *No description.* | -| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| Backend | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -951,7 +951,7 @@ Username *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -963,7 +963,7 @@ Backend *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -975,7 +975,7 @@ Groups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -987,7 +987,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1004,7 +1004,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1016,7 +1016,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.java.md b/docs/ldapAuthBackendUser.java.md index 45e1dbee..f950af7f 100644 --- a/docs/ldapAuthBackendUser.java.md +++ b/docs/ldapAuthBackendUser.java.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -43,12 +43,12 @@ LdapAuthBackendUser.Builder.create(Construct scope, java.lang.String id) | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -153,7 +153,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- @@ -623,7 +623,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -989,12 +989,12 @@ LdapAuthBackendUserConfig.builder() | lifecycle | com.hashicorp.cdktf.TerraformResourceLifecycle | *No description.* | | provider | com.hashicorp.cdktf.TerraformProvider | *No description.* | | provisioners | java.util.List | *No description.* | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -1076,7 +1076,7 @@ public java.lang.String getUsername(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -1088,7 +1088,7 @@ public java.lang.String getBackend(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -1100,7 +1100,7 @@ public java.util.List getGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -1112,7 +1112,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1129,7 +1129,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1141,7 +1141,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.python.md b/docs/ldapAuthBackendUser.python.md index 4f641c1f..a7525e2e 100644 --- a/docs/ldapAuthBackendUser.python.md +++ b/docs/ldapAuthBackendUser.python.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -41,12 +41,12 @@ ldapAuthBackendUser.LdapAuthBackendUser( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -151,7 +151,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- @@ -667,7 +667,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -1029,12 +1029,12 @@ ldapAuthBackendUser.LdapAuthBackendUserConfig( | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | str | Target namespace. (requires Enterprise). | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -1116,7 +1116,7 @@ username: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -1128,7 +1128,7 @@ backend: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -1140,7 +1140,7 @@ groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -1152,7 +1152,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1169,7 +1169,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1181,7 +1181,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapAuthBackendUser.typescript.md b/docs/ldapAuthBackendUser.typescript.md index 8cf94330..3af8061d 100644 --- a/docs/ldapAuthBackendUser.typescript.md +++ b/docs/ldapAuthBackendUser.typescript.md @@ -4,7 +4,7 @@ ### LdapAuthBackendUser -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user vault_ldap_auth_backend_user}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapAuthBackendUser to imp The id of the existing LdapAuthBackendUser that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -850,12 +850,12 @@ const ldapAuthBackendUserConfig: ldapAuthBackendUser.LdapAuthBackendUserConfig = | lifecycle | cdktf.TerraformResourceLifecycle | *No description.* | | provider | cdktf.TerraformProvider | *No description.* | | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | -| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | -| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | -| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | +| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. | +| backend | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. | +| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. | | namespace | string | Target namespace. (requires Enterprise). | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. | --- @@ -937,7 +937,7 @@ public readonly username: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#username LdapAuthBackendUser#username}. --- @@ -949,7 +949,7 @@ public readonly backend: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#backend LdapAuthBackendUser#backend}. --- @@ -961,7 +961,7 @@ public readonly groups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#groups LdapAuthBackendUser#groups}. --- @@ -973,7 +973,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#id LdapAuthBackendUser#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -990,7 +990,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#namespace LdapAuthBackendUser#namespace} --- @@ -1002,7 +1002,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_auth_backend_user#policies LdapAuthBackendUser#policies}. --- diff --git a/docs/ldapSecretBackend.csharp.md b/docs/ldapSecretBackend.csharp.md index dd466c26..df98fff5 100644 --- a/docs/ldapSecretBackend.csharp.md +++ b/docs/ldapSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -705,7 +705,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1783,7 +1783,7 @@ new LdapSecretBackendConfig { | Description | string | Human-friendly description of the mount. | | DisableRemount | object | If set, opts out of mount migration on path updates. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | IdentityTokenKey | string | The key to use for signing plugin workload identity tokens. | | InsecureTls | object | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | ListingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -1887,7 +1887,7 @@ public string Binddn { get; set; } Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1901,7 +1901,7 @@ public string Bindpass { get; set; } LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1915,7 +1915,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1929,7 +1929,7 @@ public string[] AllowedResponseHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -1943,7 +1943,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1957,7 +1957,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1971,7 +1971,7 @@ public string Certificate { get; set; } CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1985,7 +1985,7 @@ public string ClientTlsCert { get; set; } Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1999,7 +1999,7 @@ public string ClientTlsKey { get; set; } Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2013,7 +2013,7 @@ public double ConnectionTimeout { get; set; } Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2027,7 +2027,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2041,7 +2041,7 @@ public string[] DelegatedAuthAccessors { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -2055,7 +2055,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2069,7 +2069,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2083,7 +2083,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2095,7 +2095,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2112,7 +2112,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -2126,7 +2126,7 @@ public object InsecureTls { get; set; } Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2140,7 +2140,7 @@ public string ListingVisibility { get; set; } Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -2154,7 +2154,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2168,7 +2168,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2182,7 +2182,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2196,7 +2196,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2210,7 +2210,7 @@ public string[] PassthroughRequestHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -2224,7 +2224,7 @@ public string PasswordPolicy { get; set; } Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2238,7 +2238,7 @@ public string Path { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2252,7 +2252,7 @@ public string PluginVersion { get; set; } Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -2266,7 +2266,7 @@ public double RequestTimeout { get; set; } Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2280,7 +2280,7 @@ public string Schema { get; set; } The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2294,7 +2294,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -2308,7 +2308,7 @@ public object SkipStaticRoleImportRotation { get; set; } Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2322,7 +2322,7 @@ public object Starttls { get; set; } Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2336,7 +2336,7 @@ public string Upndomain { get; set; } Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2350,7 +2350,7 @@ public string Url { get; set; } LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2364,7 +2364,7 @@ public string Userattr { get; set; } Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2378,7 +2378,7 @@ public string Userdn { get; set; } LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.go.md b/docs/ldapSecretBackend.go.md index 75ff9503..4375f22d 100644 --- a/docs/ldapSecretBackend.go.md +++ b/docs/ldapSecretBackend.go.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -705,7 +705,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1783,7 +1783,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackend" | Description | *string | Human-friendly description of the mount. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | IdentityTokenKey | *string | The key to use for signing plugin workload identity tokens. | | InsecureTls | interface{} | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | ListingVisibility | *string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -1887,7 +1887,7 @@ Binddn *string Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1901,7 +1901,7 @@ Bindpass *string LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1915,7 +1915,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1929,7 +1929,7 @@ AllowedResponseHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -1943,7 +1943,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1957,7 +1957,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1971,7 +1971,7 @@ Certificate *string CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1985,7 +1985,7 @@ ClientTlsCert *string Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1999,7 +1999,7 @@ ClientTlsKey *string Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2013,7 +2013,7 @@ ConnectionTimeout *f64 Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2027,7 +2027,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2041,7 +2041,7 @@ DelegatedAuthAccessors *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -2055,7 +2055,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2069,7 +2069,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2083,7 +2083,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2095,7 +2095,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2112,7 +2112,7 @@ IdentityTokenKey *string The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -2126,7 +2126,7 @@ InsecureTls interface{} Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2140,7 +2140,7 @@ ListingVisibility *string Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -2154,7 +2154,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2168,7 +2168,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2182,7 +2182,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2196,7 +2196,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2210,7 +2210,7 @@ PassthroughRequestHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -2224,7 +2224,7 @@ PasswordPolicy *string Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2238,7 +2238,7 @@ Path *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2252,7 +2252,7 @@ PluginVersion *string Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -2266,7 +2266,7 @@ RequestTimeout *f64 Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2280,7 +2280,7 @@ Schema *string The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2294,7 +2294,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -2308,7 +2308,7 @@ SkipStaticRoleImportRotation interface{} Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2322,7 +2322,7 @@ Starttls interface{} Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2336,7 +2336,7 @@ Upndomain *string Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2350,7 +2350,7 @@ Url *string LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2364,7 +2364,7 @@ Userattr *string Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2378,7 +2378,7 @@ Userdn *string LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.java.md b/docs/ldapSecretBackend.java.md index 67d9e318..9b895b27 100644 --- a/docs/ldapSecretBackend.java.md +++ b/docs/ldapSecretBackend.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -95,7 +95,7 @@ LdapSecretBackend.Builder.create(Construct scope, java.lang.String id) | description | java.lang.String | Human-friendly description of the mount. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -185,7 +185,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -215,7 +215,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -225,7 +225,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -235,7 +235,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -245,7 +245,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -255,7 +255,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -333,7 +333,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -346,7 +346,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -356,7 +356,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -366,7 +366,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -376,7 +376,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -386,7 +386,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -396,7 +396,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -406,7 +406,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -416,7 +416,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -426,7 +426,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -436,7 +436,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -446,7 +446,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -456,7 +456,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -466,7 +466,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -476,7 +476,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -486,7 +486,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -496,7 +496,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -506,7 +506,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -516,7 +516,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -526,7 +526,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -536,7 +536,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- @@ -1201,7 +1201,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -2290,7 +2290,7 @@ LdapSecretBackendConfig.builder() | description | java.lang.String | Human-friendly description of the mount. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | insecureTls | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -2394,7 +2394,7 @@ public java.lang.String getBinddn(); Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -2408,7 +2408,7 @@ public java.lang.String getBindpass(); LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -2422,7 +2422,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -2436,7 +2436,7 @@ public java.util.List getAllowedResponseHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -2450,7 +2450,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -2464,7 +2464,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -2478,7 +2478,7 @@ public java.lang.String getCertificate(); CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -2492,7 +2492,7 @@ public java.lang.String getClientTlsCert(); Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -2506,7 +2506,7 @@ public java.lang.String getClientTlsKey(); Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2520,7 +2520,7 @@ public java.lang.Number getConnectionTimeout(); Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2534,7 +2534,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2548,7 +2548,7 @@ public java.util.List getDelegatedAuthAccessors(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -2562,7 +2562,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2576,7 +2576,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2590,7 +2590,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2602,7 +2602,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2619,7 +2619,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -2633,7 +2633,7 @@ public java.lang.Object getInsecureTls(); Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2647,7 +2647,7 @@ public java.lang.String getListingVisibility(); Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -2661,7 +2661,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2675,7 +2675,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2689,7 +2689,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2703,7 +2703,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2717,7 +2717,7 @@ public java.util.List getPassthroughRequestHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -2731,7 +2731,7 @@ public java.lang.String getPasswordPolicy(); Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2745,7 +2745,7 @@ public java.lang.String getPath(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2759,7 +2759,7 @@ public java.lang.String getPluginVersion(); Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -2773,7 +2773,7 @@ public java.lang.Number getRequestTimeout(); Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2787,7 +2787,7 @@ public java.lang.String getSchema(); The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2801,7 +2801,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -2815,7 +2815,7 @@ public java.lang.Object getSkipStaticRoleImportRotation(); Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2829,7 +2829,7 @@ public java.lang.Object getStarttls(); Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2843,7 +2843,7 @@ public java.lang.String getUpndomain(); Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2857,7 +2857,7 @@ public java.lang.String getUrl(); LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2871,7 +2871,7 @@ public java.lang.String getUserattr(); Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2885,7 +2885,7 @@ public java.lang.String getUserdn(); LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.python.md b/docs/ldapSecretBackend.python.md index 7071e3f3..c1a013e7 100644 --- a/docs/ldapSecretBackend.python.md +++ b/docs/ldapSecretBackend.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -86,7 +86,7 @@ ldapSecretBackend.LdapSecretBackend( | description | str | Human-friendly description of the mount. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -176,7 +176,7 @@ Must be unique amongst siblings in the same scope Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -216,7 +216,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -226,7 +226,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -324,7 +324,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -337,7 +337,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -347,7 +347,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -357,7 +357,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -367,7 +367,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -377,7 +377,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -387,7 +387,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -397,7 +397,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -407,7 +407,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -417,7 +417,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -427,7 +427,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -437,7 +437,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -447,7 +447,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -457,7 +457,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -467,7 +467,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -477,7 +477,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -487,7 +487,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -497,7 +497,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -507,7 +507,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -517,7 +517,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -527,7 +527,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- @@ -1238,7 +1238,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -2316,7 +2316,7 @@ ldapSecretBackend.LdapSecretBackendConfig( | description | str | Human-friendly description of the mount. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | insecure_tls | typing.Union[bool, cdktf.IResolvable] | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -2420,7 +2420,7 @@ binddn: str Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -2434,7 +2434,7 @@ bindpass: str LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -2448,7 +2448,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -2462,7 +2462,7 @@ allowed_response_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -2476,7 +2476,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -2490,7 +2490,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -2504,7 +2504,7 @@ certificate: str CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -2518,7 +2518,7 @@ client_tls_cert: str Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -2532,7 +2532,7 @@ client_tls_key: str Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -2546,7 +2546,7 @@ connection_timeout: typing.Union[int, float] Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -2560,7 +2560,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -2574,7 +2574,7 @@ delegated_auth_accessors: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -2588,7 +2588,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2602,7 +2602,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2616,7 +2616,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2628,7 +2628,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2645,7 +2645,7 @@ identity_token_key: str The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -2659,7 +2659,7 @@ insecure_tls: typing.Union[bool, IResolvable] Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2673,7 +2673,7 @@ listing_visibility: str Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -2687,7 +2687,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2701,7 +2701,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2715,7 +2715,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2729,7 +2729,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2743,7 +2743,7 @@ passthrough_request_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -2757,7 +2757,7 @@ password_policy: str Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2771,7 +2771,7 @@ path: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2785,7 +2785,7 @@ plugin_version: str Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -2799,7 +2799,7 @@ request_timeout: typing.Union[int, float] Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2813,7 +2813,7 @@ schema: str The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2827,7 +2827,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -2841,7 +2841,7 @@ skip_static_role_import_rotation: typing.Union[bool, IResolvable] Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2855,7 +2855,7 @@ starttls: typing.Union[bool, IResolvable] Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2869,7 +2869,7 @@ upndomain: str Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2883,7 +2883,7 @@ url: str LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2897,7 +2897,7 @@ userattr: str Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2911,7 +2911,7 @@ userdn: str LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackend.typescript.md b/docs/ldapSecretBackend.typescript.md index 4d7e4152..0fbb37b3 100644 --- a/docs/ldapSecretBackend.typescript.md +++ b/docs/ldapSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}. #### Initializers @@ -705,7 +705,7 @@ The construct id used in the generated config for the LdapSecretBackend to impor The id of the existing LdapSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1739,7 +1739,7 @@ const ldapSecretBackendConfig: ldapSecretBackend.LdapSecretBackendConfig = { ... | description | string | Human-friendly description of the mount. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. | | identityTokenKey | string | The key to use for signing plugin workload identity tokens. | | insecureTls | boolean \| cdktf.IResolvable | Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. | | listingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | @@ -1843,7 +1843,7 @@ public readonly binddn: string; Distinguished name of object to bind when performing user and group search. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} --- @@ -1857,7 +1857,7 @@ public readonly bindpass: string; LDAP password for searching for the user DN. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} --- @@ -1871,7 +1871,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} --- @@ -1885,7 +1885,7 @@ public readonly allowedResponseHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#allowed_response_headers LdapSecretBackend#allowed_response_headers} --- @@ -1899,7 +1899,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} --- @@ -1913,7 +1913,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} --- @@ -1927,7 +1927,7 @@ public readonly certificate: string; CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} --- @@ -1941,7 +1941,7 @@ public readonly clientTlsCert: string; Client certificate to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} --- @@ -1955,7 +1955,7 @@ public readonly clientTlsKey: string; Client certificate key to provide to the LDAP server, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} --- @@ -1969,7 +1969,7 @@ public readonly connectionTimeout: number; Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} --- @@ -1983,7 +1983,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} --- @@ -1997,7 +1997,7 @@ public readonly delegatedAuthAccessors: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#delegated_auth_accessors LdapSecretBackend#delegated_auth_accessors} --- @@ -2011,7 +2011,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} --- @@ -2025,7 +2025,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} --- @@ -2039,7 +2039,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} --- @@ -2051,7 +2051,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -2068,7 +2068,7 @@ public readonly identityTokenKey: string; The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#identity_token_key LdapSecretBackend#identity_token_key} --- @@ -2082,7 +2082,7 @@ public readonly insecureTls: boolean | IResolvable; Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} --- @@ -2096,7 +2096,7 @@ public readonly listingVisibility: string; Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#listing_visibility LdapSecretBackend#listing_visibility} --- @@ -2110,7 +2110,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} --- @@ -2124,7 +2124,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} --- @@ -2138,7 +2138,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} --- @@ -2152,7 +2152,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} --- @@ -2166,7 +2166,7 @@ public readonly passthroughRequestHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#passthrough_request_headers LdapSecretBackend#passthrough_request_headers} --- @@ -2180,7 +2180,7 @@ public readonly passwordPolicy: string; Name of the password policy to use to generate passwords. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} --- @@ -2194,7 +2194,7 @@ public readonly path: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} --- @@ -2208,7 +2208,7 @@ public readonly pluginVersion: string; Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#plugin_version LdapSecretBackend#plugin_version} --- @@ -2222,7 +2222,7 @@ public readonly requestTimeout: number; Timeout, in seconds, for the connection when making requests against the server before returning back an error. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} --- @@ -2236,7 +2236,7 @@ public readonly schema: string; The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} --- @@ -2250,7 +2250,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} --- @@ -2264,7 +2264,7 @@ public readonly skipStaticRoleImportRotation: boolean | IResolvable; Skip rotation of static role secrets on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#skip_static_role_import_rotation LdapSecretBackend#skip_static_role_import_rotation} --- @@ -2278,7 +2278,7 @@ public readonly starttls: boolean | IResolvable; Issue a StartTLS command after establishing unencrypted connection. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} --- @@ -2292,7 +2292,7 @@ public readonly upndomain: string; Enables userPrincipalDomain login with [username]@UPNDomain. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} --- @@ -2306,7 +2306,7 @@ public readonly url: string; LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} --- @@ -2320,7 +2320,7 @@ public readonly userattr: string; Attribute used for users (default: cn). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} --- @@ -2334,7 +2334,7 @@ public readonly userdn: string; LDAP domain to use for users (eg: ou=People,dc=example,dc=org). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} --- diff --git a/docs/ldapSecretBackendDynamicRole.csharp.md b/docs/ldapSecretBackendDynamicRole.csharp.md index fa50a998..7a2c4631 100644 --- a/docs/ldapSecretBackendDynamicRole.csharp.md +++ b/docs/ldapSecretBackendDynamicRole.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -974,7 +974,7 @@ new LdapSecretBackendDynamicRoleConfig { | DeletionLdif | string | A templatized LDIF string used to delete the user account once its TTL has expired. | | RoleName | string | Name of the role. | | DefaultTtl | double | Specifies the TTL for the leases associated with this role. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | MaxTtl | double | Specifies the maximum TTL for the leases associated with this role. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1063,7 +1063,7 @@ public string CreationLdif { get; set; } A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1079,7 +1079,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1093,7 +1093,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1107,7 +1107,7 @@ public double DefaultTtl { get; set; } Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1119,7 +1119,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public double MaxTtl { get; set; } Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1150,7 +1150,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1164,7 +1164,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1180,7 +1180,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1196,7 +1196,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.go.md b/docs/ldapSecretBackendDynamicRole.go.md index d0a8efae..ec6b22cb 100644 --- a/docs/ldapSecretBackendDynamicRole.go.md +++ b/docs/ldapSecretBackendDynamicRole.go.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -974,7 +974,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackenddyna | DeletionLdif | *string | A templatized LDIF string used to delete the user account once its TTL has expired. | | RoleName | *string | Name of the role. | | DefaultTtl | *f64 | Specifies the TTL for the leases associated with this role. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | MaxTtl | *f64 | Specifies the maximum TTL for the leases associated with this role. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1063,7 +1063,7 @@ CreationLdif *string A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1079,7 +1079,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1093,7 +1093,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1107,7 +1107,7 @@ DefaultTtl *f64 Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1119,7 +1119,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ MaxTtl *f64 Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1150,7 +1150,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1164,7 +1164,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1180,7 +1180,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1196,7 +1196,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.java.md b/docs/ldapSecretBackendDynamicRole.java.md index db54dad5..bc1e43da 100644 --- a/docs/ldapSecretBackendDynamicRole.java.md +++ b/docs/ldapSecretBackendDynamicRole.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -51,7 +51,7 @@ LdapSecretBackendDynamicRole.Builder.create(Construct scope, java.lang.String id | deletionLdif | java.lang.String | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | java.lang.String | Name of the role. | | defaultTtl | java.lang.Number | Specifies the TTL for the leases associated with this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | java.lang.Number | Specifies the maximum TTL for the leases associated with this role. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -138,7 +138,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -211,7 +211,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -223,7 +223,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- @@ -699,7 +699,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -1161,7 +1161,7 @@ LdapSecretBackendDynamicRoleConfig.builder() | deletionLdif | java.lang.String | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | java.lang.String | Name of the role. | | defaultTtl | java.lang.Number | Specifies the TTL for the leases associated with this role. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | java.lang.Number | Specifies the maximum TTL for the leases associated with this role. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1250,7 +1250,7 @@ public java.lang.String getCreationLdif(); A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1266,7 +1266,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1280,7 +1280,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1294,7 +1294,7 @@ public java.lang.Number getDefaultTtl(); Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1306,7 +1306,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1323,7 +1323,7 @@ public java.lang.Number getMaxTtl(); Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1337,7 +1337,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1351,7 +1351,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1367,7 +1367,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1383,7 +1383,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.python.md b/docs/ldapSecretBackendDynamicRole.python.md index 61f0fc1e..0b495262 100644 --- a/docs/ldapSecretBackendDynamicRole.python.md +++ b/docs/ldapSecretBackendDynamicRole.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -49,7 +49,7 @@ ldapSecretBackendDynamicRole.LdapSecretBackendDynamicRole( | deletion_ldif | str | A templatized LDIF string used to delete the user account once its TTL has expired. | | role_name | str | Name of the role. | | default_ttl | typing.Union[int, float] | Specifies the TTL for the leases associated with this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | max_ttl | typing.Union[int, float] | Specifies the maximum TTL for the leases associated with this role. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -136,7 +136,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -209,7 +209,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -221,7 +221,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- @@ -743,7 +743,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -1201,7 +1201,7 @@ ldapSecretBackendDynamicRole.LdapSecretBackendDynamicRoleConfig( | deletion_ldif | str | A templatized LDIF string used to delete the user account once its TTL has expired. | | role_name | str | Name of the role. | | default_ttl | typing.Union[int, float] | Specifies the TTL for the leases associated with this role. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | max_ttl | typing.Union[int, float] | Specifies the maximum TTL for the leases associated with this role. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1290,7 +1290,7 @@ creation_ldif: str A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1306,7 +1306,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1320,7 +1320,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1334,7 +1334,7 @@ default_ttl: typing.Union[int, float] Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1346,7 +1346,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1363,7 +1363,7 @@ max_ttl: typing.Union[int, float] Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1377,7 +1377,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1391,7 +1391,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1407,7 +1407,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1423,7 +1423,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendDynamicRole.typescript.md b/docs/ldapSecretBackendDynamicRole.typescript.md index b60f0bcf..1fa5bd6e 100644 --- a/docs/ldapSecretBackendDynamicRole.typescript.md +++ b/docs/ldapSecretBackendDynamicRole.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendDynamicRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role vault_ldap_secret_backend_dynamic_role}. #### Initializers @@ -516,7 +516,7 @@ The construct id used in the generated config for the LdapSecretBackendDynamicRo The id of the existing LdapSecretBackendDynamicRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#import import section} in the documentation of this resource for the id to use --- @@ -956,7 +956,7 @@ const ldapSecretBackendDynamicRoleConfig: ldapSecretBackendDynamicRole.LdapSecre | deletionLdif | string | A templatized LDIF string used to delete the user account once its TTL has expired. | | roleName | string | Name of the role. | | defaultTtl | number | Specifies the TTL for the leases associated with this role. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. | | maxTtl | number | Specifies the maximum TTL for the leases associated with this role. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1045,7 +1045,7 @@ public readonly creationLdif: string; A templatized LDIF string used to create a user account. May contain multiple entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#creation_ldif LdapSecretBackendDynamicRole#creation_ldif} --- @@ -1061,7 +1061,7 @@ A templatized LDIF string used to delete the user account once its TTL has expir This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#deletion_ldif LdapSecretBackendDynamicRole#deletion_ldif} --- @@ -1075,7 +1075,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#role_name LdapSecretBackendDynamicRole#role_name} --- @@ -1089,7 +1089,7 @@ public readonly defaultTtl: number; Specifies the TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#default_ttl LdapSecretBackendDynamicRole#default_ttl} --- @@ -1101,7 +1101,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#id LdapSecretBackendDynamicRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1118,7 +1118,7 @@ public readonly maxTtl: number; Specifies the maximum TTL for the leases associated with this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#max_ttl LdapSecretBackendDynamicRole#max_ttl} --- @@ -1132,7 +1132,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#mount LdapSecretBackendDynamicRole#mount} --- @@ -1146,7 +1146,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#namespace LdapSecretBackendDynamicRole#namespace} --- @@ -1162,7 +1162,7 @@ A templatized LDIF string used to attempt to rollback any changes in the event t This may contain multiple LDIF entries. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#rollback_ldif LdapSecretBackendDynamicRole#rollback_ldif} --- @@ -1178,7 +1178,7 @@ A template used to generate a dynamic username. This will be used to fill in the .Username field within the creation_ldif string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_dynamic_role#username_template LdapSecretBackendDynamicRole#username_template} --- diff --git a/docs/ldapSecretBackendLibrarySet.csharp.md b/docs/ldapSecretBackendLibrarySet.csharp.md index 5f62e94d..016887f7 100644 --- a/docs/ldapSecretBackendLibrarySet.csharp.md +++ b/docs/ldapSecretBackendLibrarySet.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ new LdapSecretBackendLibrarySetConfig { | Name | string | The name of the set of service accounts. | | ServiceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | object | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | MaxTtl | double | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1008,7 +1008,7 @@ public string Name { get; set; } The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1022,7 +1022,7 @@ public string[] ServiceAccountNames { get; set; } The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1036,7 +1036,7 @@ public object DisableCheckInEnforcement { get; set; } Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1048,7 +1048,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1081,7 +1081,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1095,7 +1095,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1111,7 +1111,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.go.md b/docs/ldapSecretBackendLibrarySet.go.md index 9fcc8c14..01404fe5 100644 --- a/docs/ldapSecretBackendLibrarySet.go.md +++ b/docs/ldapSecretBackendLibrarySet.go.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -920,7 +920,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendlibr | Name | *string | The name of the set of service accounts. | | ServiceAccountNames | *[]*string | The names of all the service accounts that can be checked out from this set. | | DisableCheckInEnforcement | interface{} | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | MaxTtl | *f64 | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1008,7 +1008,7 @@ Name *string The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1022,7 +1022,7 @@ ServiceAccountNames *[]*string The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1036,7 +1036,7 @@ DisableCheckInEnforcement interface{} Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1048,7 +1048,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1067,7 +1067,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1081,7 +1081,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1095,7 +1095,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1111,7 +1111,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.java.md b/docs/ldapSecretBackendLibrarySet.java.md index b347c2df..e90cf5a3 100644 --- a/docs/ldapSecretBackendLibrarySet.java.md +++ b/docs/ldapSecretBackendLibrarySet.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -49,7 +49,7 @@ LdapSecretBackendLibrarySet.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | java.lang.Number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -151,7 +151,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -166,7 +166,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -198,7 +198,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- @@ -667,7 +667,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -1083,7 +1083,7 @@ LdapSecretBackendLibrarySetConfig.builder() | name | java.lang.String | The name of the set of service accounts. | | serviceAccountNames | java.util.List | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | java.lang.Number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1171,7 +1171,7 @@ public java.lang.String getName(); The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1185,7 +1185,7 @@ public java.util.List getServiceAccountNames(); The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1199,7 +1199,7 @@ public java.lang.Object getDisableCheckInEnforcement(); Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1211,7 +1211,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1230,7 +1230,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1244,7 +1244,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1258,7 +1258,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1274,7 +1274,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.python.md b/docs/ldapSecretBackendLibrarySet.python.md index 2811e0ca..b54d7728 100644 --- a/docs/ldapSecretBackendLibrarySet.python.md +++ b/docs/ldapSecretBackendLibrarySet.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -46,7 +46,7 @@ ldapSecretBackendLibrarySet.LdapSecretBackendLibrarySet( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -183,7 +183,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -195,7 +195,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- @@ -710,7 +710,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -1121,7 +1121,7 @@ ldapSecretBackendLibrarySet.LdapSecretBackendLibrarySetConfig( | name | str | The name of the set of service accounts. | | service_account_names | typing.List[str] | The names of all the service accounts that can be checked out from this set. | | disable_check_in_enforcement | typing.Union[bool, cdktf.IResolvable] | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | max_ttl | typing.Union[int, float] | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1209,7 +1209,7 @@ name: str The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1223,7 +1223,7 @@ service_account_names: typing.List[str] The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1237,7 +1237,7 @@ disable_check_in_enforcement: typing.Union[bool, IResolvable] Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1249,7 +1249,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1268,7 +1268,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1282,7 +1282,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1296,7 +1296,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1312,7 +1312,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendLibrarySet.typescript.md b/docs/ldapSecretBackendLibrarySet.typescript.md index 19c3b8e9..ca828208 100644 --- a/docs/ldapSecretBackendLibrarySet.typescript.md +++ b/docs/ldapSecretBackendLibrarySet.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendLibrarySet -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set vault_ldap_secret_backend_library_set}. #### Initializers @@ -509,7 +509,7 @@ The construct id used in the generated config for the LdapSecretBackendLibrarySe The id of the existing LdapSecretBackendLibrarySet that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#import import section} in the documentation of this resource for the id to use --- @@ -904,7 +904,7 @@ const ldapSecretBackendLibrarySetConfig: ldapSecretBackendLibrarySet.LdapSecretB | name | string | The name of the set of service accounts. | | serviceAccountNames | string[] | The names of all the service accounts that can be checked out from this set. | | disableCheckInEnforcement | boolean \| cdktf.IResolvable | Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. | | maxTtl | number | The maximum amount of time a check-out last with renewal before Vault automatically checks it back in. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | @@ -992,7 +992,7 @@ public readonly name: string; The name of the set of service accounts. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#name LdapSecretBackendLibrarySet#name} --- @@ -1006,7 +1006,7 @@ public readonly serviceAccountNames: string[]; The names of all the service accounts that can be checked out from this set. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#service_account_names LdapSecretBackendLibrarySet#service_account_names} --- @@ -1020,7 +1020,7 @@ public readonly disableCheckInEnforcement: boolean | IResolvable; Disable enforcing that service accounts must be checked in by the entity or client token that checked them out. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#disable_check_in_enforcement LdapSecretBackendLibrarySet#disable_check_in_enforcement} --- @@ -1032,7 +1032,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#id LdapSecretBackendLibrarySet#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1051,7 +1051,7 @@ The maximum amount of time a check-out last with renewal before Vault automatica Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#max_ttl LdapSecretBackendLibrarySet#max_ttl} --- @@ -1065,7 +1065,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#mount LdapSecretBackendLibrarySet#mount} --- @@ -1079,7 +1079,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#namespace LdapSecretBackendLibrarySet#namespace} --- @@ -1095,7 +1095,7 @@ The maximum amount of time a single check-out lasts before Vault automatically c Defaults to 24 hours. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_library_set#ttl LdapSecretBackendLibrarySet#ttl} --- diff --git a/docs/ldapSecretBackendStaticRole.csharp.md b/docs/ldapSecretBackendStaticRole.csharp.md index d0f41acf..fb2f2854 100644 --- a/docs/ldapSecretBackendStaticRole.csharp.md +++ b/docs/ldapSecretBackendStaticRole.csharp.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ new LdapSecretBackendStaticRoleConfig { | RotationPeriod | double | How often Vault should rotate the password of the user entry. | | Username | string | The username of the existing LDAP entry to manage password rotation for. | | Dn | string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | Mount | string | The path where the LDAP secrets backend is mounted. | | Namespace | string | Target namespace. (requires Enterprise). | | SkipImportRotation | object | Skip rotation of the password on import. | @@ -1001,7 +1001,7 @@ public string RoleName { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1015,7 +1015,7 @@ public double RotationPeriod { get; set; } How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1029,7 +1029,7 @@ public string Username { get; set; } The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1043,7 +1043,7 @@ public string Dn { get; set; } Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1055,7 +1055,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1072,7 +1072,7 @@ public string Mount { get; set; } The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1086,7 +1086,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -1100,7 +1100,7 @@ public object SkipImportRotation { get; set; } Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.go.md b/docs/ldapSecretBackendStaticRole.go.md index 2954104b..db05c017 100644 --- a/docs/ldapSecretBackendStaticRole.go.md +++ b/docs/ldapSecretBackendStaticRole.go.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/ldapsecretbackendstat | RotationPeriod | *f64 | How often Vault should rotate the password of the user entry. | | Username | *string | The username of the existing LDAP entry to manage password rotation for. | | Dn | *string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | Mount | *string | The path where the LDAP secrets backend is mounted. | | Namespace | *string | Target namespace. (requires Enterprise). | | SkipImportRotation | interface{} | Skip rotation of the password on import. | @@ -1001,7 +1001,7 @@ RoleName *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1015,7 +1015,7 @@ RotationPeriod *f64 How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1029,7 +1029,7 @@ Username *string The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1043,7 +1043,7 @@ Dn *string Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1055,7 +1055,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1072,7 +1072,7 @@ Mount *string The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1086,7 +1086,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -1100,7 +1100,7 @@ SkipImportRotation interface{} Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.java.md b/docs/ldapSecretBackendStaticRole.java.md index 1fa0ba5d..2be99fc1 100644 --- a/docs/ldapSecretBackendStaticRole.java.md +++ b/docs/ldapSecretBackendStaticRole.java.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -50,7 +50,7 @@ LdapSecretBackendStaticRole.Builder.create(Construct scope, java.lang.String id) | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing LDAP entry to manage password rotation for. | | dn | java.lang.String | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | skipImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of the password on import. | @@ -123,7 +123,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -133,7 +133,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -143,7 +143,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -153,7 +153,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -161,7 +161,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -174,7 +174,7 @@ If you experience problems setting this value it might not be settable. Please t The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1073,7 +1073,7 @@ LdapSecretBackendStaticRoleConfig.builder() | rotationPeriod | java.lang.Number | How often Vault should rotate the password of the user entry. | | username | java.lang.String | The username of the existing LDAP entry to manage password rotation for. | | dn | java.lang.String | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | java.lang.String | The path where the LDAP secrets backend is mounted. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | skipImportRotation | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Skip rotation of the password on import. | @@ -1160,7 +1160,7 @@ public java.lang.String getRoleName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1174,7 +1174,7 @@ public java.lang.Number getRotationPeriod(); How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1188,7 +1188,7 @@ public java.lang.String getUsername(); The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1202,7 +1202,7 @@ public java.lang.String getDn(); Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1214,7 +1214,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1231,7 +1231,7 @@ public java.lang.String getMount(); The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1245,7 +1245,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -1259,7 +1259,7 @@ public java.lang.Object getSkipImportRotation(); Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.python.md b/docs/ldapSecretBackendStaticRole.python.md index 629c2bac..8a379ce1 100644 --- a/docs/ldapSecretBackendStaticRole.python.md +++ b/docs/ldapSecretBackendStaticRole.python.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -47,7 +47,7 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRole( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing LDAP entry to manage password rotation for. | | dn | str | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | | skip_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of the password on import. | @@ -120,7 +120,7 @@ Must be unique amongst siblings in the same scope Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -171,7 +171,7 @@ If you experience problems setting this value it might not be settable. Please t The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- @@ -699,7 +699,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -1111,7 +1111,7 @@ ldapSecretBackendStaticRole.LdapSecretBackendStaticRoleConfig( | rotation_period | typing.Union[int, float] | How often Vault should rotate the password of the user entry. | | username | str | The username of the existing LDAP entry to manage password rotation for. | | dn | str | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | str | The path where the LDAP secrets backend is mounted. | | namespace | str | Target namespace. (requires Enterprise). | | skip_import_rotation | typing.Union[bool, cdktf.IResolvable] | Skip rotation of the password on import. | @@ -1198,7 +1198,7 @@ role_name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -1212,7 +1212,7 @@ rotation_period: typing.Union[int, float] How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1226,7 +1226,7 @@ username: str The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1240,7 +1240,7 @@ dn: str Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1252,7 +1252,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1269,7 +1269,7 @@ mount: str The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1283,7 +1283,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -1297,7 +1297,7 @@ skip_import_rotation: typing.Union[bool, IResolvable] Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/ldapSecretBackendStaticRole.typescript.md b/docs/ldapSecretBackendStaticRole.typescript.md index cb35c893..eb54d77c 100644 --- a/docs/ldapSecretBackendStaticRole.typescript.md +++ b/docs/ldapSecretBackendStaticRole.typescript.md @@ -4,7 +4,7 @@ ### LdapSecretBackendStaticRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role vault_ldap_secret_backend_static_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the LdapSecretBackendStaticRol The id of the existing LdapSecretBackendStaticRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#import import section} in the documentation of this resource for the id to use --- @@ -898,7 +898,7 @@ const ldapSecretBackendStaticRoleConfig: ldapSecretBackendStaticRole.LdapSecretB | rotationPeriod | number | How often Vault should rotate the password of the user entry. | | username | string | The username of the existing LDAP entry to manage password rotation for. | | dn | string | Distinguished name (DN) of the existing LDAP entry to manage password rotation for. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. | | mount | string | The path where the LDAP secrets backend is mounted. | | namespace | string | Target namespace. (requires Enterprise). | | skipImportRotation | boolean \| cdktf.IResolvable | Skip rotation of the password on import. | @@ -985,7 +985,7 @@ public readonly roleName: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#role_name LdapSecretBackendStaticRole#role_name} --- @@ -999,7 +999,7 @@ public readonly rotationPeriod: number; How often Vault should rotate the password of the user entry. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#rotation_period LdapSecretBackendStaticRole#rotation_period} --- @@ -1013,7 +1013,7 @@ public readonly username: string; The username of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#username LdapSecretBackendStaticRole#username} --- @@ -1027,7 +1027,7 @@ public readonly dn: string; Distinguished name (DN) of the existing LDAP entry to manage password rotation for. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#dn LdapSecretBackendStaticRole#dn} --- @@ -1039,7 +1039,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#id LdapSecretBackendStaticRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1056,7 +1056,7 @@ public readonly mount: string; The path where the LDAP secrets backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#mount LdapSecretBackendStaticRole#mount} --- @@ -1070,7 +1070,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#namespace LdapSecretBackendStaticRole#namespace} --- @@ -1084,7 +1084,7 @@ public readonly skipImportRotation: boolean | IResolvable; Skip rotation of the password on import. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/ldap_secret_backend_static_role#skip_import_rotation LdapSecretBackendStaticRole#skip_import_rotation} --- diff --git a/docs/managedKeys.csharp.md b/docs/managedKeys.csharp.md index 3be4033c..8bbeb8f4 100644 --- a/docs/managedKeys.csharp.md +++ b/docs/managedKeys.csharp.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ public string AccessKey { get; set; } The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -914,7 +914,7 @@ public string KeyBits { get; set; } The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -928,7 +928,7 @@ public string KeyType { get; set; } The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -942,7 +942,7 @@ public string KmsKey { get; set; } An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -956,7 +956,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -970,7 +970,7 @@ public string SecretKey { get; set; } The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -984,7 +984,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -998,7 +998,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1012,7 +1012,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1026,7 +1026,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1040,7 +1040,7 @@ public string Curve { get; set; } The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1054,7 +1054,7 @@ public string Endpoint { get; set; } Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1068,7 +1068,7 @@ public string Region { get; set; } The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1128,7 +1128,7 @@ public string ClientId { get; set; } The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1142,7 +1142,7 @@ public string ClientSecret { get; set; } The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1156,7 +1156,7 @@ public string KeyName { get; set; } The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1170,7 +1170,7 @@ public string KeyType { get; set; } The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1184,7 +1184,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1198,7 +1198,7 @@ public string TenantId { get; set; } The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1212,7 +1212,7 @@ public string VaultName { get; set; } The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1226,7 +1226,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1240,7 +1240,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1254,7 +1254,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1268,7 +1268,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1282,7 +1282,7 @@ public string Environment { get; set; } The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1298,7 +1298,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1312,7 +1312,7 @@ public string Resource { get; set; } The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1352,7 +1352,7 @@ new ManagedKeysConfig { | Provisioners | object[] | *No description.* | | Aws | object | aws block. | | Azure | object | azure block. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Pkcs | object | pkcs block. | @@ -1438,7 +1438,7 @@ public object Aws { get; set; } aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1452,7 +1452,7 @@ public object Azure { get; set; } azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1464,7 +1464,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1481,7 +1481,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1495,7 +1495,7 @@ public object Pkcs { get; set; } pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1557,7 +1557,7 @@ public string KeyId { get; set; } The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1571,7 +1571,7 @@ public string KeyLabel { get; set; } The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1585,7 +1585,7 @@ public string Library { get; set; } The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1599,7 +1599,7 @@ public string Mechanism { get; set; } The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1613,7 +1613,7 @@ public string Name { get; set; } A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1627,7 +1627,7 @@ public string Pin { get; set; } The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1641,7 +1641,7 @@ public object AllowGenerateKey { get; set; } If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1655,7 +1655,7 @@ public object AllowReplaceKey { get; set; } Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1669,7 +1669,7 @@ public object AllowStoreKey { get; set; } Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1683,7 +1683,7 @@ public object AnyMount { get; set; } Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1697,7 +1697,7 @@ public string Curve { get; set; } Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1711,7 +1711,7 @@ public string ForceRwSession { get; set; } Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1727,7 +1727,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1741,7 +1741,7 @@ public string Slot { get; set; } The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1755,7 +1755,7 @@ public string TokenLabel { get; set; } The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.go.md b/docs/managedKeys.go.md index d6267ee8..6824e5ba 100644 --- a/docs/managedKeys.go.md +++ b/docs/managedKeys.go.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -900,7 +900,7 @@ AccessKey *string The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -914,7 +914,7 @@ KeyBits *string The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -928,7 +928,7 @@ KeyType *string The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -942,7 +942,7 @@ KmsKey *string An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -956,7 +956,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -970,7 +970,7 @@ SecretKey *string The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -984,7 +984,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -998,7 +998,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1012,7 +1012,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1026,7 +1026,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1040,7 +1040,7 @@ Curve *string The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1054,7 +1054,7 @@ Endpoint *string Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1068,7 +1068,7 @@ Region *string The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1128,7 +1128,7 @@ ClientId *string The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1142,7 +1142,7 @@ ClientSecret *string The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1156,7 +1156,7 @@ KeyName *string The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1170,7 +1170,7 @@ KeyType *string The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1184,7 +1184,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1198,7 +1198,7 @@ TenantId *string The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1212,7 +1212,7 @@ VaultName *string The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1226,7 +1226,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1240,7 +1240,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1254,7 +1254,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1268,7 +1268,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1282,7 +1282,7 @@ Environment *string The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1298,7 +1298,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1312,7 +1312,7 @@ Resource *string The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1352,7 +1352,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/managedkeys" | Provisioners | *[]interface{} | *No description.* | | Aws | interface{} | aws block. | | Azure | interface{} | azure block. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Pkcs | interface{} | pkcs block. | @@ -1438,7 +1438,7 @@ Aws interface{} aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1452,7 +1452,7 @@ Azure interface{} azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1464,7 +1464,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1481,7 +1481,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1495,7 +1495,7 @@ Pkcs interface{} pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1557,7 +1557,7 @@ KeyId *string The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1571,7 +1571,7 @@ KeyLabel *string The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1585,7 +1585,7 @@ Library *string The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1599,7 +1599,7 @@ Mechanism *string The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1613,7 +1613,7 @@ Name *string A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1627,7 +1627,7 @@ Pin *string The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1641,7 +1641,7 @@ AllowGenerateKey interface{} If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1655,7 +1655,7 @@ AllowReplaceKey interface{} Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1669,7 +1669,7 @@ AllowStoreKey interface{} Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1683,7 +1683,7 @@ AnyMount interface{} Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1697,7 +1697,7 @@ Curve *string Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1711,7 +1711,7 @@ ForceRwSession *string Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1727,7 +1727,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1741,7 +1741,7 @@ Slot *string The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1755,7 +1755,7 @@ TokenLabel *string The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.java.md b/docs/managedKeys.java.md index 563d03e6..10d97ade 100644 --- a/docs/managedKeys.java.md +++ b/docs/managedKeys.java.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -47,7 +47,7 @@ ManagedKeys.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | aws | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAws> | aws block. | | azure | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAzure> | azure block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pkcs | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysPkcs> | pkcs block. | @@ -119,7 +119,7 @@ Must be unique amongst siblings in the same scope aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -129,7 +129,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -137,7 +137,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -150,7 +150,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -661,7 +661,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -1024,7 +1024,7 @@ public java.lang.String getAccessKey(); The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -1038,7 +1038,7 @@ public java.lang.String getKeyBits(); The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1052,7 +1052,7 @@ public java.lang.String getKeyType(); The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1066,7 +1066,7 @@ public java.lang.String getKmsKey(); An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -1080,7 +1080,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1094,7 +1094,7 @@ public java.lang.String getSecretKey(); The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -1108,7 +1108,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1122,7 +1122,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1136,7 +1136,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1150,7 +1150,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1164,7 +1164,7 @@ public java.lang.String getCurve(); The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1178,7 +1178,7 @@ public java.lang.String getEndpoint(); Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1192,7 +1192,7 @@ public java.lang.String getRegion(); The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1256,7 +1256,7 @@ public java.lang.String getClientId(); The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1270,7 +1270,7 @@ public java.lang.String getClientSecret(); The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1284,7 +1284,7 @@ public java.lang.String getKeyName(); The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1298,7 +1298,7 @@ public java.lang.String getKeyType(); The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1312,7 +1312,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1326,7 +1326,7 @@ public java.lang.String getTenantId(); The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1340,7 +1340,7 @@ public java.lang.String getVaultName(); The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1354,7 +1354,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1368,7 +1368,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1382,7 +1382,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1396,7 +1396,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1410,7 +1410,7 @@ public java.lang.String getEnvironment(); The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1426,7 +1426,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1440,7 +1440,7 @@ public java.lang.String getResource(); The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1487,7 +1487,7 @@ ManagedKeysConfig.builder() | provisioners | java.util.List | *No description.* | | aws | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAws> | aws block. | | azure | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysAzure> | azure block. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pkcs | com.hashicorp.cdktf.IResolvable OR java.util.List<ManagedKeysPkcs> | pkcs block. | @@ -1573,7 +1573,7 @@ public java.lang.Object getAws(); aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1587,7 +1587,7 @@ public java.lang.Object getAzure(); azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1599,7 +1599,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1616,7 +1616,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1630,7 +1630,7 @@ public java.lang.Object getPkcs(); pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1696,7 +1696,7 @@ public java.lang.String getKeyId(); The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1710,7 +1710,7 @@ public java.lang.String getKeyLabel(); The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1724,7 +1724,7 @@ public java.lang.String getLibrary(); The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1738,7 +1738,7 @@ public java.lang.String getMechanism(); The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1752,7 +1752,7 @@ public java.lang.String getName(); A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1766,7 +1766,7 @@ public java.lang.String getPin(); The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1780,7 +1780,7 @@ public java.lang.Object getAllowGenerateKey(); If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1794,7 +1794,7 @@ public java.lang.Object getAllowReplaceKey(); Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1808,7 +1808,7 @@ public java.lang.Object getAllowStoreKey(); Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1822,7 +1822,7 @@ public java.lang.Object getAnyMount(); Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1836,7 +1836,7 @@ public java.lang.String getCurve(); Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1850,7 +1850,7 @@ public java.lang.String getForceRwSession(); Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1866,7 +1866,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1880,7 +1880,7 @@ public java.lang.String getSlot(); The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1894,7 +1894,7 @@ public java.lang.String getTokenLabel(); The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.python.md b/docs/managedKeys.python.md index 1c08c326..b565238a 100644 --- a/docs/managedKeys.python.md +++ b/docs/managedKeys.python.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -42,7 +42,7 @@ managedKeys.ManagedKeys( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | aws | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAws]] | aws block. | | azure | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAzure]] | azure block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pkcs | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysPkcs]] | pkcs block. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -708,7 +708,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -1067,7 +1067,7 @@ access_key: str The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -1081,7 +1081,7 @@ key_bits: str The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1095,7 +1095,7 @@ key_type: str The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1109,7 +1109,7 @@ kms_key: str An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -1123,7 +1123,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1137,7 +1137,7 @@ secret_key: str The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -1151,7 +1151,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1165,7 +1165,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1179,7 +1179,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1193,7 +1193,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1207,7 +1207,7 @@ curve: str The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1221,7 +1221,7 @@ endpoint: str Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1235,7 +1235,7 @@ region: str The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1295,7 +1295,7 @@ client_id: str The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1309,7 +1309,7 @@ client_secret: str The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1323,7 +1323,7 @@ key_name: str The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1337,7 +1337,7 @@ key_type: str The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1351,7 +1351,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1365,7 +1365,7 @@ tenant_id: str The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1379,7 +1379,7 @@ vault_name: str The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1393,7 +1393,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1407,7 +1407,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1421,7 +1421,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1435,7 +1435,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1449,7 +1449,7 @@ environment: str The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1465,7 +1465,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1479,7 +1479,7 @@ resource: str The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1519,7 +1519,7 @@ managedKeys.ManagedKeysConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | aws | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAws]] | aws block. | | azure | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysAzure]] | azure block. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | str | Target namespace. (requires Enterprise). | | pkcs | typing.Union[cdktf.IResolvable, typing.List[ManagedKeysPkcs]] | pkcs block. | @@ -1605,7 +1605,7 @@ aws: typing.Union[IResolvable, typing.List[ManagedKeysAws]] aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1619,7 +1619,7 @@ azure: typing.Union[IResolvable, typing.List[ManagedKeysAzure]] azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1631,7 +1631,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1648,7 +1648,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1662,7 +1662,7 @@ pkcs: typing.Union[IResolvable, typing.List[ManagedKeysPkcs]] pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1724,7 +1724,7 @@ key_id: str The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1738,7 +1738,7 @@ key_label: str The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1752,7 +1752,7 @@ library: str The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1766,7 +1766,7 @@ mechanism: str The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1780,7 +1780,7 @@ name: str A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1794,7 +1794,7 @@ pin: str The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1808,7 +1808,7 @@ allow_generate_key: typing.Union[bool, IResolvable] If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1822,7 +1822,7 @@ allow_replace_key: typing.Union[bool, IResolvable] Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1836,7 +1836,7 @@ allow_store_key: typing.Union[bool, IResolvable] Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1850,7 +1850,7 @@ any_mount: typing.Union[bool, IResolvable] Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1864,7 +1864,7 @@ curve: str Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1878,7 +1878,7 @@ force_rw_session: str Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1894,7 +1894,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1908,7 +1908,7 @@ slot: str The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1922,7 +1922,7 @@ token_label: str The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/managedKeys.typescript.md b/docs/managedKeys.typescript.md index 1d4c15ff..c28eb576 100644 --- a/docs/managedKeys.typescript.md +++ b/docs/managedKeys.typescript.md @@ -4,7 +4,7 @@ ### ManagedKeys -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys vault_managed_keys}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys vault_managed_keys}. #### Initializers @@ -541,7 +541,7 @@ The construct id used in the generated config for the ManagedKeys to import. The id of the existing ManagedKeys that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#import import section} in the documentation of this resource for the id to use --- @@ -886,7 +886,7 @@ public readonly accessKey: string; The AWS access key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#access_key ManagedKeys#access_key} --- @@ -900,7 +900,7 @@ public readonly keyBits: string; The size in bits for an RSA key. This field is required when 'key_type' is 'RSA'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -914,7 +914,7 @@ public readonly keyType: string; The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -928,7 +928,7 @@ public readonly kmsKey: string; An identifier for the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#kms_key ManagedKeys#kms_key} --- @@ -942,7 +942,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -956,7 +956,7 @@ public readonly secretKey: string; The AWS secret key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#secret_key ManagedKeys#secret_key} --- @@ -970,7 +970,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -984,7 +984,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -998,7 +998,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1012,7 +1012,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1026,7 +1026,7 @@ public readonly curve: string; The curve to use for an ECDSA key. Used when key_type is 'ECDSA'. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1040,7 +1040,7 @@ public readonly endpoint: string; Used to specify a custom AWS endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#endpoint ManagedKeys#endpoint} --- @@ -1054,7 +1054,7 @@ public readonly region: string; The AWS region where the keys are stored (or will be stored). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#region ManagedKeys#region} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#region ManagedKeys#region} --- @@ -1099,7 +1099,7 @@ public readonly clientId: string; The client id for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_id ManagedKeys#client_id} --- @@ -1113,7 +1113,7 @@ public readonly clientSecret: string; The client secret for credentials to query the Azure APIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#client_secret ManagedKeys#client_secret} --- @@ -1127,7 +1127,7 @@ public readonly keyName: string; The Key Vault key to use for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_name ManagedKeys#key_name} --- @@ -1141,7 +1141,7 @@ public readonly keyType: string; The type of key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_type ManagedKeys#key_type} --- @@ -1155,7 +1155,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1169,7 +1169,7 @@ public readonly tenantId: string; The tenant id for the Azure Active Directory organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#tenant_id ManagedKeys#tenant_id} --- @@ -1183,7 +1183,7 @@ public readonly vaultName: string; The Key Vault vault to use the encryption keys for encryption and decryption. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#vault_name ManagedKeys#vault_name} --- @@ -1197,7 +1197,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1211,7 +1211,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1225,7 +1225,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1239,7 +1239,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1253,7 +1253,7 @@ public readonly environment: string; The Azure Cloud environment API endpoints to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#environment ManagedKeys#environment} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#environment ManagedKeys#environment} --- @@ -1269,7 +1269,7 @@ The size in bits for an RSA key. This field is required when 'key_type' is 'RSA' or when 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1283,7 +1283,7 @@ public readonly resource: string; The Azure Key Vault resource's DNS Suffix to connect to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#resource ManagedKeys#resource} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#resource ManagedKeys#resource} --- @@ -1310,7 +1310,7 @@ const managedKeysConfig: managedKeys.ManagedKeysConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | aws | cdktf.IResolvable \| ManagedKeysAws[] | aws block. | | azure | cdktf.IResolvable \| ManagedKeysAzure[] | azure block. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pkcs | cdktf.IResolvable \| ManagedKeysPkcs[] | pkcs block. | @@ -1396,7 +1396,7 @@ public readonly aws: IResolvable | ManagedKeysAws[]; aws block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#aws ManagedKeys#aws} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#aws ManagedKeys#aws} --- @@ -1410,7 +1410,7 @@ public readonly azure: IResolvable | ManagedKeysAzure[]; azure block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#azure ManagedKeys#azure} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#azure ManagedKeys#azure} --- @@ -1422,7 +1422,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#id ManagedKeys#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#id ManagedKeys#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1439,7 +1439,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#namespace ManagedKeys#namespace} --- @@ -1453,7 +1453,7 @@ public readonly pkcs: IResolvable | ManagedKeysPkcs[]; pkcs block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pkcs ManagedKeys#pkcs} --- @@ -1499,7 +1499,7 @@ public readonly keyId: string; The id of a PKCS#11 key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_id ManagedKeys#key_id} --- @@ -1513,7 +1513,7 @@ public readonly keyLabel: string; The label of the key to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_label ManagedKeys#key_label} --- @@ -1527,7 +1527,7 @@ public readonly library: string; The name of the kms_library stanza to use from Vault's config to lookup the local library path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#library ManagedKeys#library} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#library ManagedKeys#library} --- @@ -1541,7 +1541,7 @@ public readonly mechanism: string; The encryption/decryption mechanism to use, specified as a hexadecimal (prefixed by 0x) string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#mechanism ManagedKeys#mechanism} --- @@ -1555,7 +1555,7 @@ public readonly name: string; A unique lowercase name that serves as identifying the key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#name ManagedKeys#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#name ManagedKeys#name} --- @@ -1569,7 +1569,7 @@ public readonly pin: string; The PIN for login. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#pin ManagedKeys#pin} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#pin ManagedKeys#pin} --- @@ -1583,7 +1583,7 @@ public readonly allowGenerateKey: boolean | IResolvable; If no existing key can be found in the referenced backend, instructs Vault to generate a key within the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_generate_key ManagedKeys#allow_generate_key} --- @@ -1597,7 +1597,7 @@ public readonly allowReplaceKey: boolean | IResolvable; Controls the ability for Vault to replace through generation or importing a key into the configured backend even if a key is present, if set to false those operations are forbidden if a key exists. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_replace_key ManagedKeys#allow_replace_key} --- @@ -1611,7 +1611,7 @@ public readonly allowStoreKey: boolean | IResolvable; Controls the ability for Vault to import a key to the configured backend, if 'false', those operations will be forbidden. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#allow_store_key ManagedKeys#allow_store_key} --- @@ -1625,7 +1625,7 @@ public readonly anyMount: boolean | IResolvable; Allow usage from any mount point within the namespace if 'true'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#any_mount ManagedKeys#any_mount} --- @@ -1639,7 +1639,7 @@ public readonly curve: string; Supplies the curve value when using the 'CKM_ECDSA' mechanism. Required if 'allow_generate_key' is true. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#curve ManagedKeys#curve} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#curve ManagedKeys#curve} --- @@ -1653,7 +1653,7 @@ public readonly forceRwSession: string; Force all operations to open up a read-write session to the HSM. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#force_rw_session ManagedKeys#force_rw_session} --- @@ -1669,7 +1669,7 @@ Supplies the size in bits of the key when using 'CKM_RSA_PKCS_PSS', 'CKM_RSA_PKC Required if 'allow_generate_key' is true -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#key_bits ManagedKeys#key_bits} --- @@ -1683,7 +1683,7 @@ public readonly slot: string; The slot number to use, specified as a string in a decimal format (e.g. '2305843009213693953'). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#slot ManagedKeys#slot} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#slot ManagedKeys#slot} --- @@ -1697,7 +1697,7 @@ public readonly tokenLabel: string; The slot token label to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/managed_keys#token_label ManagedKeys#token_label} --- diff --git a/docs/mfaDuo.csharp.md b/docs/mfaDuo.csharp.md index 930e1a2e..5979658a 100644 --- a/docs/mfaDuo.csharp.md +++ b/docs/mfaDuo.csharp.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -931,7 +931,7 @@ new MfaDuoConfig { | MountAccessor | string | The mount to tie this method to for use in automatic mappings. | | Name | string | Name of the MFA method. | | SecretKey | string | Secret key for Duo. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PushInfo | string | Push information for Duo. | | UsernameFormat | string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1018,7 +1018,7 @@ public string ApiHostname { get; set; } API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1032,7 +1032,7 @@ public string IntegrationKey { get; set; } Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1048,7 +1048,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1062,7 +1062,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1076,7 +1076,7 @@ public string SecretKey { get; set; } Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1088,7 +1088,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1105,7 +1105,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1119,7 +1119,7 @@ public string PushInfo { get; set; } Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1133,7 +1133,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.go.md b/docs/mfaDuo.go.md index 0d4bc96a..b60d3f95 100644 --- a/docs/mfaDuo.go.md +++ b/docs/mfaDuo.go.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -931,7 +931,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mfaduo" | MountAccessor | *string | The mount to tie this method to for use in automatic mappings. | | Name | *string | Name of the MFA method. | | SecretKey | *string | Secret key for Duo. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PushInfo | *string | Push information for Duo. | | UsernameFormat | *string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1018,7 +1018,7 @@ ApiHostname *string API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1032,7 +1032,7 @@ IntegrationKey *string Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1048,7 +1048,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1062,7 +1062,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1076,7 +1076,7 @@ SecretKey *string Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1088,7 +1088,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1105,7 +1105,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1119,7 +1119,7 @@ PushInfo *string Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1133,7 +1133,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.java.md b/docs/mfaDuo.java.md index 91cde061..997ce2a9 100644 --- a/docs/mfaDuo.java.md +++ b/docs/mfaDuo.java.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -51,7 +51,7 @@ MfaDuo.Builder.create(Construct scope, java.lang.String id) | mountAccessor | java.lang.String | The mount to tie this method to for use in automatic mappings. | | name | java.lang.String | Name of the MFA method. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usernameFormat | java.lang.String | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -146,7 +146,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- @@ -662,7 +662,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1102,7 +1102,7 @@ MfaDuoConfig.builder() | mountAccessor | java.lang.String | The mount to tie this method to for use in automatic mappings. | | name | java.lang.String | Name of the MFA method. | | secretKey | java.lang.String | Secret key for Duo. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pushInfo | java.lang.String | Push information for Duo. | | usernameFormat | java.lang.String | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1189,7 +1189,7 @@ public java.lang.String getApiHostname(); API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1203,7 +1203,7 @@ public java.lang.String getIntegrationKey(); Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1219,7 +1219,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1233,7 +1233,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1247,7 +1247,7 @@ public java.lang.String getSecretKey(); Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1259,7 +1259,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1276,7 +1276,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1290,7 +1290,7 @@ public java.lang.String getPushInfo(); Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1304,7 +1304,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.python.md b/docs/mfaDuo.python.md index 2f66b866..db6d51d2 100644 --- a/docs/mfaDuo.python.md +++ b/docs/mfaDuo.python.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -49,7 +49,7 @@ mfaDuo.MfaDuo( | mount_accessor | str | The mount to tie this method to for use in automatic mappings. | | name | str | Name of the MFA method. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | username_format | str | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -144,7 +144,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -172,7 +172,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -185,7 +185,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- @@ -706,7 +706,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -1142,7 +1142,7 @@ mfaDuo.MfaDuoConfig( | mount_accessor | str | The mount to tie this method to for use in automatic mappings. | | name | str | Name of the MFA method. | | secret_key | str | Secret key for Duo. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | str | Target namespace. (requires Enterprise). | | push_info | str | Push information for Duo. | | username_format | str | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1229,7 +1229,7 @@ api_hostname: str API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1243,7 +1243,7 @@ integration_key: str Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1259,7 +1259,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1273,7 +1273,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1287,7 +1287,7 @@ secret_key: str Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1299,7 +1299,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1316,7 +1316,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1330,7 +1330,7 @@ push_info: str Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1344,7 +1344,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaDuo.typescript.md b/docs/mfaDuo.typescript.md index d9c23123..58737117 100644 --- a/docs/mfaDuo.typescript.md +++ b/docs/mfaDuo.typescript.md @@ -4,7 +4,7 @@ ### MfaDuo -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo vault_mfa_duo}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo vault_mfa_duo}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the MfaDuo to import. The id of the existing MfaDuo that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#import import section} in the documentation of this resource for the id to use --- @@ -914,7 +914,7 @@ const mfaDuoConfig: mfaDuo.MfaDuoConfig = { ... } | mountAccessor | string | The mount to tie this method to for use in automatic mappings. | | name | string | Name of the MFA method. | | secretKey | string | Secret key for Duo. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pushInfo | string | Push information for Duo. | | usernameFormat | string | A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. | @@ -1001,7 +1001,7 @@ public readonly apiHostname: string; API hostname for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#api_hostname MfaDuo#api_hostname} --- @@ -1015,7 +1015,7 @@ public readonly integrationKey: string; Integration key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#integration_key MfaDuo#integration_key} --- @@ -1031,7 +1031,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#mount_accessor MfaDuo#mount_accessor} --- @@ -1045,7 +1045,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#name MfaDuo#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#name MfaDuo#name} --- @@ -1059,7 +1059,7 @@ public readonly secretKey: string; Secret key for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#secret_key MfaDuo#secret_key} --- @@ -1071,7 +1071,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#id MfaDuo#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#id MfaDuo#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1088,7 +1088,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#namespace MfaDuo#namespace} --- @@ -1102,7 +1102,7 @@ public readonly pushInfo: string; Push information for Duo. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#push_info MfaDuo#push_info} --- @@ -1116,7 +1116,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_duo#username_format MfaDuo#username_format} --- diff --git a/docs/mfaOkta.csharp.md b/docs/mfaOkta.csharp.md index db00f96e..811c54f6 100644 --- a/docs/mfaOkta.csharp.md +++ b/docs/mfaOkta.csharp.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1025,7 +1025,7 @@ public string ApiToken { get; set; } Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1041,7 +1041,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1055,7 +1055,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1069,7 +1069,7 @@ public string OrgName { get; set; } Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1083,7 +1083,7 @@ public string BaseUrl { get; set; } If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1097,7 +1097,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1128,7 +1128,7 @@ public object PrimaryEmail { get; set; } If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1142,7 +1142,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.go.md b/docs/mfaOkta.go.md index be21913e..27535e01 100644 --- a/docs/mfaOkta.go.md +++ b/docs/mfaOkta.go.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1025,7 +1025,7 @@ ApiToken *string Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1041,7 +1041,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1055,7 +1055,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1069,7 +1069,7 @@ OrgName *string Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1083,7 +1083,7 @@ BaseUrl *string If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1097,7 +1097,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1114,7 +1114,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1128,7 +1128,7 @@ PrimaryEmail interface{} If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1142,7 +1142,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.java.md b/docs/mfaOkta.java.md index 70c8ca8d..1ea79ebc 100644 --- a/docs/mfaOkta.java.md +++ b/docs/mfaOkta.java.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -125,7 +125,7 @@ Must be unique amongst siblings in the same scope Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -137,7 +137,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -147,7 +147,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -177,7 +177,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -190,7 +190,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- @@ -672,7 +672,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1200,7 +1200,7 @@ public java.lang.String getApiToken(); Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1216,7 +1216,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1230,7 +1230,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1244,7 +1244,7 @@ public java.lang.String getOrgName(); Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1258,7 +1258,7 @@ public java.lang.String getBaseUrl(); If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1272,7 +1272,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1289,7 +1289,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1303,7 +1303,7 @@ public java.lang.Object getPrimaryEmail(); If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1317,7 +1317,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.python.md b/docs/mfaOkta.python.md index f100ef74..77f05890 100644 --- a/docs/mfaOkta.python.md +++ b/docs/mfaOkta.python.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -122,7 +122,7 @@ Must be unique amongst siblings in the same scope Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -134,7 +134,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -187,7 +187,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- @@ -715,7 +715,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1238,7 +1238,7 @@ api_token: str Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1254,7 +1254,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1268,7 +1268,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1282,7 +1282,7 @@ org_name: str Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1296,7 +1296,7 @@ base_url: str If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1310,7 +1310,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1327,7 +1327,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1341,7 +1341,7 @@ primary_email: typing.Union[bool, IResolvable] If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1355,7 +1355,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaOkta.typescript.md b/docs/mfaOkta.typescript.md index 5571e061..2cad2fe2 100644 --- a/docs/mfaOkta.typescript.md +++ b/docs/mfaOkta.typescript.md @@ -4,7 +4,7 @@ ### MfaOkta -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta vault_mfa_okta}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta vault_mfa_okta}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the MfaOkta to import. The id of the existing MfaOkta that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ public readonly apiToken: string; Okta API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#api_token MfaOkta#api_token} --- @@ -1024,7 +1024,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#mount_accessor MfaOkta#mount_accessor} --- @@ -1038,7 +1038,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#name MfaOkta#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#name MfaOkta#name} --- @@ -1052,7 +1052,7 @@ public readonly orgName: string; Name of the organization to be used in the Okta API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#org_name MfaOkta#org_name} --- @@ -1066,7 +1066,7 @@ public readonly baseUrl: string; If set, will be used as the base domain for API requests. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#base_url MfaOkta#base_url} --- @@ -1080,7 +1080,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#id MfaOkta#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#id MfaOkta#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#namespace MfaOkta#namespace} --- @@ -1111,7 +1111,7 @@ public readonly primaryEmail: boolean | IResolvable; If set to true, the username will only match the primary email for the account. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#primary_email MfaOkta#primary_email} --- @@ -1125,7 +1125,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_okta#username_format MfaOkta#username_format} --- diff --git a/docs/mfaPingid.csharp.md b/docs/mfaPingid.csharp.md index 730353dd..bcc98ae9 100644 --- a/docs/mfaPingid.csharp.md +++ b/docs/mfaPingid.csharp.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1018,7 +1018,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1032,7 +1032,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1046,7 +1046,7 @@ public string SettingsFileBase64 { get; set; } A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1060,7 +1060,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1091,7 +1091,7 @@ public string UsernameFormat { get; set; } A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.go.md b/docs/mfaPingid.go.md index 3fb35512..c868cf94 100644 --- a/docs/mfaPingid.go.md +++ b/docs/mfaPingid.go.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1018,7 +1018,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1032,7 +1032,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1046,7 +1046,7 @@ SettingsFileBase64 *string A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1060,7 +1060,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1077,7 +1077,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1091,7 +1091,7 @@ UsernameFormat *string A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.java.md b/docs/mfaPingid.java.md index c72f13b6..221e9cca 100644 --- a/docs/mfaPingid.java.md +++ b/docs/mfaPingid.java.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -120,7 +120,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -163,7 +163,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -173,7 +173,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- @@ -621,7 +621,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1169,7 +1169,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1183,7 +1183,7 @@ public java.lang.String getSettingsFileBase64(); A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1197,7 +1197,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1214,7 +1214,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1228,7 +1228,7 @@ public java.lang.String getUsernameFormat(); A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.python.md b/docs/mfaPingid.python.md index b98ce0af..54c6bbd9 100644 --- a/docs/mfaPingid.python.md +++ b/docs/mfaPingid.python.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -118,7 +118,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -161,7 +161,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -171,7 +171,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- @@ -665,7 +665,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1195,7 +1195,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1209,7 +1209,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1223,7 +1223,7 @@ settings_file_base64: str A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1237,7 +1237,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1254,7 +1254,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1268,7 +1268,7 @@ username_format: str A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaPingid.typescript.md b/docs/mfaPingid.typescript.md index 7ba7f512..6ef58ac9 100644 --- a/docs/mfaPingid.typescript.md +++ b/docs/mfaPingid.typescript.md @@ -4,7 +4,7 @@ ### MfaPingid -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid vault_mfa_pingid}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid vault_mfa_pingid}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the MfaPingid to import. The id of the existing MfaPingid that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#import import section} in the documentation of this resource for the id to use --- @@ -1004,7 +1004,7 @@ The mount to tie this method to for use in automatic mappings. The mapping will use the Name field of Aliases associated with this mount as the username in the mapping. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#mount_accessor MfaPingid#mount_accessor} --- @@ -1018,7 +1018,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#name MfaPingid#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#name MfaPingid#name} --- @@ -1032,7 +1032,7 @@ public readonly settingsFileBase64: string; A base64-encoded third-party settings file retrieved from PingID's configuration page. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#settings_file_base64 MfaPingid#settings_file_base64} --- @@ -1046,7 +1046,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#id MfaPingid#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#id MfaPingid#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1063,7 +1063,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#namespace MfaPingid#namespace} --- @@ -1077,7 +1077,7 @@ public readonly usernameFormat: string; A format string for mapping Identity names to MFA method names. Values to substitute should be placed in `{{}}`. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_pingid#username_format MfaPingid#username_format} --- diff --git a/docs/mfaTotp.csharp.md b/docs/mfaTotp.csharp.md index 2ca3e3ad..5cd644c6 100644 --- a/docs/mfaTotp.csharp.md +++ b/docs/mfaTotp.csharp.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1070,7 +1070,7 @@ public string Issuer { get; set; } The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1084,7 +1084,7 @@ public string Name { get; set; } Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1098,7 +1098,7 @@ public string Algorithm { get; set; } Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1112,7 +1112,7 @@ public double Digits { get; set; } The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1126,7 +1126,7 @@ public string Id { get; set; } ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ public double KeySize { get; set; } Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1157,7 +1157,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1171,7 +1171,7 @@ public double Period { get; set; } The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1185,7 +1185,7 @@ public double QrSize { get; set; } The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1201,7 +1201,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.go.md b/docs/mfaTotp.go.md index dd205b89..80148ef0 100644 --- a/docs/mfaTotp.go.md +++ b/docs/mfaTotp.go.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1070,7 +1070,7 @@ Issuer *string The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1084,7 +1084,7 @@ Name *string Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1098,7 +1098,7 @@ Algorithm *string Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1112,7 +1112,7 @@ Digits *f64 The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1126,7 +1126,7 @@ Id *string ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1143,7 +1143,7 @@ KeySize *f64 Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1157,7 +1157,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1171,7 +1171,7 @@ Period *f64 The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1185,7 +1185,7 @@ QrSize *f64 The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1201,7 +1201,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.java.md b/docs/mfaTotp.java.md index cf255604..be26448d 100644 --- a/docs/mfaTotp.java.md +++ b/docs/mfaTotp.java.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -126,7 +126,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -221,7 +221,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- @@ -704,7 +704,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1255,7 +1255,7 @@ public java.lang.String getIssuer(); The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1269,7 +1269,7 @@ public java.lang.String getName(); Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1283,7 +1283,7 @@ public java.lang.String getAlgorithm(); Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1297,7 +1297,7 @@ public java.lang.Number getDigits(); The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1311,7 +1311,7 @@ public java.lang.String getId(); ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1328,7 +1328,7 @@ public java.lang.Number getKeySize(); Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1342,7 +1342,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1356,7 +1356,7 @@ public java.lang.Number getPeriod(); The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1370,7 +1370,7 @@ public java.lang.Number getQrSize(); The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1386,7 +1386,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.python.md b/docs/mfaTotp.python.md index ac735a1f..ef83351e 100644 --- a/docs/mfaTotp.python.md +++ b/docs/mfaTotp.python.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -124,7 +124,7 @@ Must be unique amongst siblings in the same scope The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -177,7 +177,7 @@ If you experience problems setting this value it might not be settable. Please t Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -207,7 +207,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -219,7 +219,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- @@ -748,7 +748,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1295,7 +1295,7 @@ issuer: str The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1309,7 +1309,7 @@ name: str Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1323,7 +1323,7 @@ algorithm: str Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1337,7 +1337,7 @@ digits: typing.Union[int, float] The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1351,7 +1351,7 @@ id: str ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1368,7 +1368,7 @@ key_size: typing.Union[int, float] Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1382,7 +1382,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1396,7 +1396,7 @@ period: typing.Union[int, float] The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1410,7 +1410,7 @@ qr_size: typing.Union[int, float] The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1426,7 +1426,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mfaTotp.typescript.md b/docs/mfaTotp.typescript.md index 7f1f4e6c..4104312c 100644 --- a/docs/mfaTotp.typescript.md +++ b/docs/mfaTotp.typescript.md @@ -4,7 +4,7 @@ ### MfaTotp -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp vault_mfa_totp}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp vault_mfa_totp}. #### Initializers @@ -523,7 +523,7 @@ The construct id used in the generated config for the MfaTotp to import. The id of the existing MfaTotp that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#import import section} in the documentation of this resource for the id to use --- @@ -1052,7 +1052,7 @@ public readonly issuer: string; The name of the key's issuing organization. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#issuer MfaTotp#issuer} --- @@ -1066,7 +1066,7 @@ public readonly name: string; Name of the MFA method. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#name MfaTotp#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#name MfaTotp#name} --- @@ -1080,7 +1080,7 @@ public readonly algorithm: string; Specifies the hashing algorithm used to generate the TOTP code. Options include 'SHA1', 'SHA256' and 'SHA512'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#algorithm MfaTotp#algorithm} --- @@ -1094,7 +1094,7 @@ public readonly digits: number; The number of digits in the generated TOTP token. This value can either be 6 or 8. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#digits MfaTotp#digits} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#digits MfaTotp#digits} --- @@ -1108,7 +1108,7 @@ public readonly id: string; ID computed by Vault. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#id MfaTotp#id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#id MfaTotp#id} Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1125,7 +1125,7 @@ public readonly keySize: number; Specifies the size in bytes of the generated key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#key_size MfaTotp#key_size} --- @@ -1139,7 +1139,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#namespace MfaTotp#namespace} --- @@ -1153,7 +1153,7 @@ public readonly period: number; The length of time used to generate a counter for the TOTP token calculation. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#period MfaTotp#period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#period MfaTotp#period} --- @@ -1167,7 +1167,7 @@ public readonly qrSize: number; The pixel size of the generated square QR code. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#qr_size MfaTotp#qr_size} --- @@ -1183,7 +1183,7 @@ The number of delay periods that are allowed when validating a TOTP token. This value can either be 0 or 1. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mfa_totp#skew MfaTotp#skew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mfa_totp#skew MfaTotp#skew} --- diff --git a/docs/mongodbatlasSecretBackend.csharp.md b/docs/mongodbatlasSecretBackend.csharp.md index b4c748e0..1b2bc65a 100644 --- a/docs/mongodbatlasSecretBackend.csharp.md +++ b/docs/mongodbatlasSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ new MongodbatlasSecretBackendConfig { | Mount | string | Path where MongoDB Atlas secret backend is mounted. | | PrivateKey | string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | PublicKey | string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ public string Mount { get; set; } Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -933,7 +933,7 @@ public string PrivateKey { get; set; } The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -947,7 +947,7 @@ public string PublicKey { get; set; } The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -959,7 +959,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.go.md b/docs/mongodbatlasSecretBackend.go.md index 7dd01b23..e0a94abd 100644 --- a/docs/mongodbatlasSecretBackend.go.md +++ b/docs/mongodbatlasSecretBackend.go.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretbac | Mount | *string | Path where MongoDB Atlas secret backend is mounted. | | PrivateKey | *string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | PublicKey | *string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -919,7 +919,7 @@ Mount *string Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -933,7 +933,7 @@ PrivateKey *string The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -947,7 +947,7 @@ PublicKey *string The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -959,7 +959,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.java.md b/docs/mongodbatlasSecretBackend.java.md index f1b4a141..52eb301a 100644 --- a/docs/mongodbatlasSecretBackend.java.md +++ b/docs/mongodbatlasSecretBackend.java.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -45,7 +45,7 @@ MongodbatlasSecretBackend.Builder.create(Construct scope, java.lang.String id) | mount | java.lang.String | Path where MongoDB Atlas secret backend is mounted. | | privateKey | java.lang.String | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | java.lang.String | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- @@ -598,7 +598,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -955,7 +955,7 @@ MongodbatlasSecretBackendConfig.builder() | mount | java.lang.String | Path where MongoDB Atlas secret backend is mounted. | | privateKey | java.lang.String | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | java.lang.String | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -1040,7 +1040,7 @@ public java.lang.String getMount(); Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -1054,7 +1054,7 @@ public java.lang.String getPrivateKey(); The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -1068,7 +1068,7 @@ public java.lang.String getPublicKey(); The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -1080,7 +1080,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.python.md b/docs/mongodbatlasSecretBackend.python.md index e8c0b9f6..aff543f8 100644 --- a/docs/mongodbatlasSecretBackend.python.md +++ b/docs/mongodbatlasSecretBackend.python.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -43,7 +43,7 @@ mongodbatlasSecretBackend.MongodbatlasSecretBackend( | mount | str | Path where MongoDB Atlas secret backend is mounted. | | private_key | str | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | public_key | str | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -142,7 +142,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -155,7 +155,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- @@ -642,7 +642,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -995,7 +995,7 @@ mongodbatlasSecretBackend.MongodbatlasSecretBackendConfig( | mount | str | Path where MongoDB Atlas secret backend is mounted. | | private_key | str | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | public_key | str | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1080,7 +1080,7 @@ mount: str Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -1094,7 +1094,7 @@ private_key: str The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -1108,7 +1108,7 @@ public_key: str The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -1120,7 +1120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1137,7 +1137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretBackend.typescript.md b/docs/mongodbatlasSecretBackend.typescript.md index faf1f627..2ce9de74 100644 --- a/docs/mongodbatlasSecretBackend.typescript.md +++ b/docs/mongodbatlasSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend vault_mongodbatlas_secret_backend}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the MongodbatlasSecretBackend The id of the existing MongodbatlasSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -821,7 +821,7 @@ const mongodbatlasSecretBackendConfig: mongodbatlasSecretBackend.MongodbatlasSec | mount | string | Path where MongoDB Atlas secret backend is mounted. | | privateKey | string | The Private Programmatic API Key used to connect with MongoDB Atlas API. | | publicKey | string | The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -906,7 +906,7 @@ public readonly mount: string; Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#mount MongodbatlasSecretBackend#mount} --- @@ -920,7 +920,7 @@ public readonly privateKey: string; The Private Programmatic API Key used to connect with MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#private_key MongodbatlasSecretBackend#private_key} --- @@ -934,7 +934,7 @@ public readonly publicKey: string; The Public Programmatic API Key used to authenticate with the MongoDB Atlas API. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#public_key MongodbatlasSecretBackend#public_key} --- @@ -946,7 +946,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#id MongodbatlasSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -963,7 +963,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_backend#namespace MongodbatlasSecretBackend#namespace} --- diff --git a/docs/mongodbatlasSecretRole.csharp.md b/docs/mongodbatlasSecretRole.csharp.md index c93afffe..887e0df3 100644 --- a/docs/mongodbatlasSecretRole.csharp.md +++ b/docs/mongodbatlasSecretRole.csharp.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1034,7 +1034,7 @@ new MongodbatlasSecretRoleConfig { | Name | string | Name of the role. | | Roles | string[] | List of roles that the API Key needs to have. | | CidrBlocks | string[] | Whitelist entry in CIDR notation to be added for the API key. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | IpAddresses | string[] | IP address to be added to the whitelist for the API key. | | MaxTtl | string | The maximum allowed lifetime of credentials issued using this role. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1125,7 +1125,7 @@ public string Mount { get; set; } Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1139,7 +1139,7 @@ public string Name { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1153,7 +1153,7 @@ public string[] Roles { get; set; } List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1167,7 +1167,7 @@ public string[] CidrBlocks { get; set; } Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1179,7 +1179,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1196,7 +1196,7 @@ public string[] IpAddresses { get; set; } IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1210,7 +1210,7 @@ public string MaxTtl { get; set; } The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1224,7 +1224,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1238,7 +1238,7 @@ public string OrganizationId { get; set; } ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1252,7 +1252,7 @@ public string ProjectId { get; set; } ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1266,7 +1266,7 @@ public string[] ProjectRoles { get; set; } Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1280,7 +1280,7 @@ public string Ttl { get; set; } Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.go.md b/docs/mongodbatlasSecretRole.go.md index de2142fb..03030591 100644 --- a/docs/mongodbatlasSecretRole.go.md +++ b/docs/mongodbatlasSecretRole.go.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1034,7 +1034,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mongodbatlassecretrol | Name | *string | Name of the role. | | Roles | *[]*string | List of roles that the API Key needs to have. | | CidrBlocks | *[]*string | Whitelist entry in CIDR notation to be added for the API key. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | IpAddresses | *[]*string | IP address to be added to the whitelist for the API key. | | MaxTtl | *string | The maximum allowed lifetime of credentials issued using this role. | | Namespace | *string | Target namespace. (requires Enterprise). | @@ -1125,7 +1125,7 @@ Mount *string Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1139,7 +1139,7 @@ Name *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1153,7 +1153,7 @@ Roles *[]*string List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1167,7 +1167,7 @@ CidrBlocks *[]*string Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1179,7 +1179,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1196,7 +1196,7 @@ IpAddresses *[]*string IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1210,7 +1210,7 @@ MaxTtl *string The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1224,7 +1224,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1238,7 +1238,7 @@ OrganizationId *string ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1252,7 +1252,7 @@ ProjectId *string ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1266,7 +1266,7 @@ ProjectRoles *[]*string Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1280,7 +1280,7 @@ Ttl *string Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.java.md b/docs/mongodbatlasSecretRole.java.md index 4d31a7b3..97e3abf8 100644 --- a/docs/mongodbatlasSecretRole.java.md +++ b/docs/mongodbatlasSecretRole.java.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -53,7 +53,7 @@ MongodbatlasSecretRole.Builder.create(Construct scope, java.lang.String id) | name | java.lang.String | Name of the role. | | roles | java.util.List | List of roles that the API Key needs to have. | | cidrBlocks | java.util.List | Whitelist entry in CIDR notation to be added for the API key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | java.util.List | IP address to be added to the whitelist for the API key. | | maxTtl | java.lang.String | The maximum allowed lifetime of credentials issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -130,7 +130,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -140,7 +140,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -168,7 +168,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -181,7 +181,7 @@ If you experience problems setting this value it might not be settable. Please t IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -191,7 +191,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -201,7 +201,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -211,7 +211,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -221,7 +221,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- @@ -731,7 +731,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1239,7 +1239,7 @@ MongodbatlasSecretRoleConfig.builder() | name | java.lang.String | Name of the role. | | roles | java.util.List | List of roles that the API Key needs to have. | | cidrBlocks | java.util.List | Whitelist entry in CIDR notation to be added for the API key. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | java.util.List | IP address to be added to the whitelist for the API key. | | maxTtl | java.lang.String | The maximum allowed lifetime of credentials issued using this role. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | @@ -1330,7 +1330,7 @@ public java.lang.String getMount(); Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1344,7 +1344,7 @@ public java.lang.String getName(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1358,7 +1358,7 @@ public java.util.List getRoles(); List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1372,7 +1372,7 @@ public java.util.List getCidrBlocks(); Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1384,7 +1384,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1401,7 +1401,7 @@ public java.util.List getIpAddresses(); IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1415,7 +1415,7 @@ public java.lang.String getMaxTtl(); The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1429,7 +1429,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1443,7 +1443,7 @@ public java.lang.String getOrganizationId(); ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1457,7 +1457,7 @@ public java.lang.String getProjectId(); ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1471,7 +1471,7 @@ public java.util.List getProjectRoles(); Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1485,7 +1485,7 @@ public java.lang.String getTtl(); Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.python.md b/docs/mongodbatlasSecretRole.python.md index b732f731..14b38563 100644 --- a/docs/mongodbatlasSecretRole.python.md +++ b/docs/mongodbatlasSecretRole.python.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -51,7 +51,7 @@ mongodbatlasSecretRole.MongodbatlasSecretRole( | name | str | Name of the role. | | roles | typing.List[str] | List of roles that the API Key needs to have. | | cidr_blocks | typing.List[str] | Whitelist entry in CIDR notation to be added for the API key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ip_addresses | typing.List[str] | IP address to be added to the whitelist for the API key. | | max_ttl | str | The maximum allowed lifetime of credentials issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -128,7 +128,7 @@ Must be unique amongst siblings in the same scope Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -148,7 +148,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -179,7 +179,7 @@ If you experience problems setting this value it might not be settable. Please t IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- @@ -775,7 +775,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1279,7 +1279,7 @@ mongodbatlasSecretRole.MongodbatlasSecretRoleConfig( | name | str | Name of the role. | | roles | typing.List[str] | List of roles that the API Key needs to have. | | cidr_blocks | typing.List[str] | Whitelist entry in CIDR notation to be added for the API key. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ip_addresses | typing.List[str] | IP address to be added to the whitelist for the API key. | | max_ttl | str | The maximum allowed lifetime of credentials issued using this role. | | namespace | str | Target namespace. (requires Enterprise). | @@ -1370,7 +1370,7 @@ mount: str Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1384,7 +1384,7 @@ name: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1398,7 +1398,7 @@ roles: typing.List[str] List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1412,7 +1412,7 @@ cidr_blocks: typing.List[str] Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1424,7 +1424,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1441,7 +1441,7 @@ ip_addresses: typing.List[str] IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1455,7 +1455,7 @@ max_ttl: str The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1469,7 +1469,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1483,7 +1483,7 @@ organization_id: str ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1497,7 +1497,7 @@ project_id: str ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1511,7 +1511,7 @@ project_roles: typing.List[str] Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1525,7 +1525,7 @@ ttl: str Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mongodbatlasSecretRole.typescript.md b/docs/mongodbatlasSecretRole.typescript.md index c72c9e55..7a8838ac 100644 --- a/docs/mongodbatlasSecretRole.typescript.md +++ b/docs/mongodbatlasSecretRole.typescript.md @@ -4,7 +4,7 @@ ### MongodbatlasSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role vault_mongodbatlas_secret_role}. #### Initializers @@ -530,7 +530,7 @@ The construct id used in the generated config for the MongodbatlasSecretRole to The id of the existing MongodbatlasSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1014,7 +1014,7 @@ const mongodbatlasSecretRoleConfig: mongodbatlasSecretRole.MongodbatlasSecretRol | name | string | Name of the role. | | roles | string[] | List of roles that the API Key needs to have. | | cidrBlocks | string[] | Whitelist entry in CIDR notation to be added for the API key. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. | | ipAddresses | string[] | IP address to be added to the whitelist for the API key. | | maxTtl | string | The maximum allowed lifetime of credentials issued using this role. | | namespace | string | Target namespace. (requires Enterprise). | @@ -1105,7 +1105,7 @@ public readonly mount: string; Path where MongoDB Atlas secret backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#mount MongodbatlasSecretRole#mount} --- @@ -1119,7 +1119,7 @@ public readonly name: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#name MongodbatlasSecretRole#name} --- @@ -1133,7 +1133,7 @@ public readonly roles: string[]; List of roles that the API Key needs to have. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#roles MongodbatlasSecretRole#roles} --- @@ -1147,7 +1147,7 @@ public readonly cidrBlocks: string[]; Whitelist entry in CIDR notation to be added for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#cidr_blocks MongodbatlasSecretRole#cidr_blocks} --- @@ -1159,7 +1159,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#id MongodbatlasSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ public readonly ipAddresses: string[]; IP address to be added to the whitelist for the API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ip_addresses MongodbatlasSecretRole#ip_addresses} --- @@ -1190,7 +1190,7 @@ public readonly maxTtl: string; The maximum allowed lifetime of credentials issued using this role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#max_ttl MongodbatlasSecretRole#max_ttl} --- @@ -1204,7 +1204,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#namespace MongodbatlasSecretRole#namespace} --- @@ -1218,7 +1218,7 @@ public readonly organizationId: string; ID for the organization to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#organization_id MongodbatlasSecretRole#organization_id} --- @@ -1232,7 +1232,7 @@ public readonly projectId: string; ID for the project to which the target API Key belongs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_id MongodbatlasSecretRole#project_id} --- @@ -1246,7 +1246,7 @@ public readonly projectRoles: string[]; Roles assigned when an org API key is assigned to a project API key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#project_roles MongodbatlasSecretRole#project_roles} --- @@ -1260,7 +1260,7 @@ public readonly ttl: string; Duration in seconds after which the issued credential should expire. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mongodbatlas_secret_role#ttl MongodbatlasSecretRole#ttl} --- diff --git a/docs/mount.csharp.md b/docs/mount.csharp.md index 115db241..3840db41 100644 --- a/docs/mount.csharp.md +++ b/docs/mount.csharp.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount vault_mount}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1298,7 +1298,7 @@ new MountConfig { | DelegatedAuthAccessors | string[] | List of headers to allow and pass from the request to the plugin. | | Description | string | Human-friendly description of the mount. | | ExternalEntropyAccess | object | Enable the secrets engine to access Vault's external entropy source. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | IdentityTokenKey | string | The key to use for signing plugin workload identity tokens. | | ListingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | | Local | object | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1391,7 +1391,7 @@ public string Path { get; set; } Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -1405,7 +1405,7 @@ public string Type { get; set; } Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -1419,7 +1419,7 @@ public string[] AllowedManagedKeys { get; set; } List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1433,7 +1433,7 @@ public string[] AllowedResponseHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -1447,7 +1447,7 @@ public string[] AuditNonHmacRequestKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1461,7 +1461,7 @@ public string[] AuditNonHmacResponseKeys { get; set; } Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1475,7 +1475,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1489,7 +1489,7 @@ public string[] DelegatedAuthAccessors { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -1503,7 +1503,7 @@ public string Description { get; set; } Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -1517,7 +1517,7 @@ public object ExternalEntropyAccess { get; set; } Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1529,7 +1529,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1546,7 +1546,7 @@ public string IdentityTokenKey { get; set; } The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -1560,7 +1560,7 @@ public string ListingVisibility { get; set; } Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -1574,7 +1574,7 @@ public object Local { get; set; } Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -1588,7 +1588,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1602,7 +1602,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1616,7 +1616,7 @@ public System.Collections.Generic.IDictionary Options { get; set Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -1630,7 +1630,7 @@ public string[] PassthroughRequestHeaders { get; set; } List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -1644,7 +1644,7 @@ public string PluginVersion { get; set; } Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -1658,7 +1658,7 @@ public object SealWrap { get; set; } Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.go.md b/docs/mount.go.md index 1793e6f5..83aa55ea 100644 --- a/docs/mount.go.md +++ b/docs/mount.go.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount vault_mount}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1298,7 +1298,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/mount" | DelegatedAuthAccessors | *[]*string | List of headers to allow and pass from the request to the plugin. | | Description | *string | Human-friendly description of the mount. | | ExternalEntropyAccess | interface{} | Enable the secrets engine to access Vault's external entropy source. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | IdentityTokenKey | *string | The key to use for signing plugin workload identity tokens. | | ListingVisibility | *string | Specifies whether to show this mount in the UI-specific listing endpoint. | | Local | interface{} | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1391,7 +1391,7 @@ Path *string Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -1405,7 +1405,7 @@ Type *string Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -1419,7 +1419,7 @@ AllowedManagedKeys *[]*string List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1433,7 +1433,7 @@ AllowedResponseHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -1447,7 +1447,7 @@ AuditNonHmacRequestKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1461,7 +1461,7 @@ AuditNonHmacResponseKeys *[]*string Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1475,7 +1475,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1489,7 +1489,7 @@ DelegatedAuthAccessors *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -1503,7 +1503,7 @@ Description *string Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -1517,7 +1517,7 @@ ExternalEntropyAccess interface{} Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1529,7 +1529,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1546,7 +1546,7 @@ IdentityTokenKey *string The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -1560,7 +1560,7 @@ ListingVisibility *string Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -1574,7 +1574,7 @@ Local interface{} Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -1588,7 +1588,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1602,7 +1602,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1616,7 +1616,7 @@ Options *map[string]*string Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -1630,7 +1630,7 @@ PassthroughRequestHeaders *[]*string List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -1644,7 +1644,7 @@ PluginVersion *string Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -1658,7 +1658,7 @@ SealWrap interface{} Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.java.md b/docs/mount.java.md index 97218b38..aab8439b 100644 --- a/docs/mount.java.md +++ b/docs/mount.java.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount vault_mount}. #### Initializers @@ -70,7 +70,7 @@ Mount.Builder.create(Construct scope, java.lang.String id) | delegatedAuthAccessors | java.util.List | List of headers to allow and pass from the request to the plugin. | | description | java.lang.String | Human-friendly description of the mount. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -149,7 +149,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -159,7 +159,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -179,7 +179,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -189,7 +189,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -199,7 +199,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -209,7 +209,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -219,7 +219,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -247,7 +247,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -260,7 +260,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -270,7 +270,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -280,7 +280,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -290,7 +290,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -300,7 +300,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -310,7 +310,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -320,7 +320,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -330,7 +330,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -340,7 +340,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- @@ -893,7 +893,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1605,7 +1605,7 @@ MountConfig.builder() | delegatedAuthAccessors | java.util.List | List of headers to allow and pass from the request to the plugin. | | description | java.lang.String | Human-friendly description of the mount. | | externalEntropyAccess | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | identityTokenKey | java.lang.String | The key to use for signing plugin workload identity tokens. | | listingVisibility | java.lang.String | Specifies whether to show this mount in the UI-specific listing endpoint. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1698,7 +1698,7 @@ public java.lang.String getPath(); Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -1712,7 +1712,7 @@ public java.lang.String getType(); Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -1726,7 +1726,7 @@ public java.util.List getAllowedManagedKeys(); List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1740,7 +1740,7 @@ public java.util.List getAllowedResponseHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -1754,7 +1754,7 @@ public java.util.List getAuditNonHmacRequestKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1768,7 +1768,7 @@ public java.util.List getAuditNonHmacResponseKeys(); Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1782,7 +1782,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1796,7 +1796,7 @@ public java.util.List getDelegatedAuthAccessors(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -1810,7 +1810,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -1824,7 +1824,7 @@ public java.lang.Object getExternalEntropyAccess(); Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1836,7 +1836,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1853,7 +1853,7 @@ public java.lang.String getIdentityTokenKey(); The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -1867,7 +1867,7 @@ public java.lang.String getListingVisibility(); Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -1881,7 +1881,7 @@ public java.lang.Object getLocal(); Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -1895,7 +1895,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1909,7 +1909,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1923,7 +1923,7 @@ public java.util.Map getOptions(); Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -1937,7 +1937,7 @@ public java.util.List getPassthroughRequestHeaders(); List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -1951,7 +1951,7 @@ public java.lang.String getPluginVersion(); Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -1965,7 +1965,7 @@ public java.lang.Object getSealWrap(); Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.python.md b/docs/mount.python.md index 7d6bc5cc..c3a4961a 100644 --- a/docs/mount.python.md +++ b/docs/mount.python.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount vault_mount}. #### Initializers @@ -65,7 +65,7 @@ mount.Mount( | delegated_auth_accessors | typing.List[str] | List of headers to allow and pass from the request to the plugin. | | description | str | Human-friendly description of the mount. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -144,7 +144,7 @@ Must be unique amongst siblings in the same scope Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -154,7 +154,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -164,7 +164,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -174,7 +174,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -194,7 +194,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -204,7 +204,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -224,7 +224,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -234,7 +234,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -242,7 +242,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -255,7 +255,7 @@ If you experience problems setting this value it might not be settable. Please t The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -305,7 +305,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -315,7 +315,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -325,7 +325,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -335,7 +335,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- @@ -934,7 +934,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1639,7 +1639,7 @@ mount.MountConfig( | delegated_auth_accessors | typing.List[str] | List of headers to allow and pass from the request to the plugin. | | description | str | Human-friendly description of the mount. | | external_entropy_access | typing.Union[bool, cdktf.IResolvable] | Enable the secrets engine to access Vault's external entropy source. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | identity_token_key | str | The key to use for signing plugin workload identity tokens. | | listing_visibility | str | Specifies whether to show this mount in the UI-specific listing endpoint. | | local | typing.Union[bool, cdktf.IResolvable] | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1732,7 +1732,7 @@ path: str Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -1746,7 +1746,7 @@ type: str Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -1760,7 +1760,7 @@ allowed_managed_keys: typing.List[str] List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1774,7 +1774,7 @@ allowed_response_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -1788,7 +1788,7 @@ audit_non_hmac_request_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1802,7 +1802,7 @@ audit_non_hmac_response_keys: typing.List[str] Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1816,7 +1816,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1830,7 +1830,7 @@ delegated_auth_accessors: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -1844,7 +1844,7 @@ description: str Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -1858,7 +1858,7 @@ external_entropy_access: typing.Union[bool, IResolvable] Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1870,7 +1870,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1887,7 +1887,7 @@ identity_token_key: str The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -1901,7 +1901,7 @@ listing_visibility: str Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -1915,7 +1915,7 @@ local: typing.Union[bool, IResolvable] Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -1929,7 +1929,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1943,7 +1943,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1957,7 +1957,7 @@ options: typing.Mapping[str] Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -1971,7 +1971,7 @@ passthrough_request_headers: typing.List[str] List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -1985,7 +1985,7 @@ plugin_version: str Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -1999,7 +1999,7 @@ seal_wrap: typing.Union[bool, IResolvable] Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/mount.typescript.md b/docs/mount.typescript.md index d93ca7f6..efe539ee 100644 --- a/docs/mount.typescript.md +++ b/docs/mount.typescript.md @@ -4,7 +4,7 @@ ### Mount -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount vault_mount}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount vault_mount}. #### Initializers @@ -593,7 +593,7 @@ The construct id used in the generated config for the Mount to import. The id of the existing Mount that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#import import section} in the documentation of this resource for the id to use --- @@ -1270,7 +1270,7 @@ const mountConfig: mount.MountConfig = { ... } | delegatedAuthAccessors | string[] | List of headers to allow and pass from the request to the plugin. | | description | string | Human-friendly description of the mount. | | externalEntropyAccess | boolean \| cdktf.IResolvable | Enable the secrets engine to access Vault's external entropy source. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. | | identityTokenKey | string | The key to use for signing plugin workload identity tokens. | | listingVisibility | string | Specifies whether to show this mount in the UI-specific listing endpoint. | | local | boolean \| cdktf.IResolvable | Local mount flag that can be explicitly set to true to enforce local mount in HA environment. | @@ -1363,7 +1363,7 @@ public readonly path: string; Where the secret backend will be mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#path Mount#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#path Mount#path} --- @@ -1377,7 +1377,7 @@ public readonly type: string; Type of the backend, such as 'aws'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#type Mount#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#type Mount#type} --- @@ -1391,7 +1391,7 @@ public readonly allowedManagedKeys: string[]; List of managed key registry entry names that the mount in question is allowed to access. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_managed_keys Mount#allowed_managed_keys} --- @@ -1405,7 +1405,7 @@ public readonly allowedResponseHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#allowed_response_headers Mount#allowed_response_headers} --- @@ -1419,7 +1419,7 @@ public readonly auditNonHmacRequestKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_request_keys Mount#audit_non_hmac_request_keys} --- @@ -1433,7 +1433,7 @@ public readonly auditNonHmacResponseKeys: string[]; Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#audit_non_hmac_response_keys Mount#audit_non_hmac_response_keys} --- @@ -1447,7 +1447,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#default_lease_ttl_seconds Mount#default_lease_ttl_seconds} --- @@ -1461,7 +1461,7 @@ public readonly delegatedAuthAccessors: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#delegated_auth_accessors Mount#delegated_auth_accessors} --- @@ -1475,7 +1475,7 @@ public readonly description: string; Human-friendly description of the mount. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#description Mount#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#description Mount#description} --- @@ -1489,7 +1489,7 @@ public readonly externalEntropyAccess: boolean | IResolvable; Enable the secrets engine to access Vault's external entropy source. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#external_entropy_access Mount#external_entropy_access} --- @@ -1501,7 +1501,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#id Mount#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#id Mount#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1518,7 +1518,7 @@ public readonly identityTokenKey: string; The key to use for signing plugin workload identity tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#identity_token_key Mount#identity_token_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#identity_token_key Mount#identity_token_key} --- @@ -1532,7 +1532,7 @@ public readonly listingVisibility: string; Specifies whether to show this mount in the UI-specific listing endpoint. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#listing_visibility Mount#listing_visibility} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#listing_visibility Mount#listing_visibility} --- @@ -1546,7 +1546,7 @@ public readonly local: boolean | IResolvable; Local mount flag that can be explicitly set to true to enforce local mount in HA environment. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#local Mount#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#local Mount#local} --- @@ -1560,7 +1560,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for tokens and secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#max_lease_ttl_seconds Mount#max_lease_ttl_seconds} --- @@ -1574,7 +1574,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#namespace Mount#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#namespace Mount#namespace} --- @@ -1588,7 +1588,7 @@ public readonly options: {[ key: string ]: string}; Specifies mount type specific options that are passed to the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#options Mount#options} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#options Mount#options} --- @@ -1602,7 +1602,7 @@ public readonly passthroughRequestHeaders: string[]; List of headers to allow and pass from the request to the plugin. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#passthrough_request_headers Mount#passthrough_request_headers} --- @@ -1616,7 +1616,7 @@ public readonly pluginVersion: string; Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#plugin_version Mount#plugin_version} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#plugin_version Mount#plugin_version} --- @@ -1630,7 +1630,7 @@ public readonly sealWrap: boolean | IResolvable; Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/mount#seal_wrap Mount#seal_wrap} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/mount#seal_wrap Mount#seal_wrap} --- diff --git a/docs/namespace.csharp.md b/docs/namespace.csharp.md index f191b73d..31bb9c63 100644 --- a/docs/namespace.csharp.md +++ b/docs/namespace.csharp.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ new NamespaceConfig { | Provisioners | object[] | *No description.* | | Path | string | Namespace path. | | CustomMetadata | System.Collections.Generic.IDictionary | Custom metadata describing this namespace. Value type is map[string]string. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | PathFq | string | The fully qualified namespace path. | @@ -933,7 +933,7 @@ public string Path { get; set; } Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -947,7 +947,7 @@ public System.Collections.Generic.IDictionary CustomMetadata { g Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -959,7 +959,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -990,7 +990,7 @@ public string PathFq { get; set; } The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.go.md b/docs/namespace.go.md index c69ae103..a70bb37b 100644 --- a/docs/namespace.go.md +++ b/docs/namespace.go.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -847,7 +847,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/namespace" | Provisioners | *[]interface{} | *No description.* | | Path | *string | Namespace path. | | CustomMetadata | *map[string]*string | Custom metadata describing this namespace. Value type is map[string]string. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | PathFq | *string | The fully qualified namespace path. | @@ -933,7 +933,7 @@ Path *string Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -947,7 +947,7 @@ CustomMetadata *map[string]*string Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -959,7 +959,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -976,7 +976,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -990,7 +990,7 @@ PathFq *string The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.java.md b/docs/namespace.java.md index 5952acbe..431ebca8 100644 --- a/docs/namespace.java.md +++ b/docs/namespace.java.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -44,7 +44,7 @@ Namespace.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | path | java.lang.String | Namespace path. | | customMetadata | java.util.Map | Custom metadata describing this namespace. Value type is map[string]string. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pathFq | java.lang.String | The fully qualified namespace path. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -968,7 +968,7 @@ NamespaceConfig.builder() | provisioners | java.util.List | *No description.* | | path | java.lang.String | Namespace path. | | customMetadata | java.util.Map | Custom metadata describing this namespace. Value type is map[string]string. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | pathFq | java.lang.String | The fully qualified namespace path. | @@ -1054,7 +1054,7 @@ public java.lang.String getPath(); Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -1068,7 +1068,7 @@ public java.util.Map getCustomMetadata(); Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -1080,7 +1080,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1097,7 +1097,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -1111,7 +1111,7 @@ public java.lang.String getPathFq(); The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.python.md b/docs/namespace.python.md index a41dfc41..d61d1b14 100644 --- a/docs/namespace.python.md +++ b/docs/namespace.python.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -42,7 +42,7 @@ namespace.Namespace( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Namespace path. | | custom_metadata | typing.Mapping[str] | Custom metadata describing this namespace. Value type is map[string]string. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path_fq | str | The fully qualified namespace path. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -1008,7 +1008,7 @@ namespace.NamespaceConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | path | str | Namespace path. | | custom_metadata | typing.Mapping[str] | Custom metadata describing this namespace. Value type is map[string]string. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path_fq | str | The fully qualified namespace path. | @@ -1094,7 +1094,7 @@ path: str Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -1108,7 +1108,7 @@ custom_metadata: typing.Mapping[str] Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -1120,7 +1120,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1137,7 +1137,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -1151,7 +1151,7 @@ path_fq: str The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/namespace.typescript.md b/docs/namespace.typescript.md index cddc7697..5aff0467 100644 --- a/docs/namespace.typescript.md +++ b/docs/namespace.typescript.md @@ -4,7 +4,7 @@ ### Namespace -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace vault_namespace}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace vault_namespace}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the Namespace to import. The id of the existing Namespace that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#import import section} in the documentation of this resource for the id to use --- @@ -834,7 +834,7 @@ const namespaceConfig: namespace.NamespaceConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | path | string | Namespace path. | | customMetadata | {[ key: string ]: string} | Custom metadata describing this namespace. Value type is map[string]string. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. | | namespace | string | Target namespace. (requires Enterprise). | | pathFq | string | The fully qualified namespace path. | @@ -920,7 +920,7 @@ public readonly path: string; Namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path Namespace#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path Namespace#path} --- @@ -934,7 +934,7 @@ public readonly customMetadata: {[ key: string ]: string}; Custom metadata describing this namespace. Value type is map[string]string. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#custom_metadata Namespace#custom_metadata} --- @@ -946,7 +946,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#id Namespace#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#id Namespace#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -963,7 +963,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#namespace Namespace#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#namespace Namespace#namespace} --- @@ -977,7 +977,7 @@ public readonly pathFq: string; The fully qualified namespace path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/namespace#path_fq Namespace#path_fq} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/namespace#path_fq Namespace#path_fq} --- diff --git a/docs/nomadSecretBackend.csharp.md b/docs/nomadSecretBackend.csharp.md index dac97528..6a8aa6c4 100644 --- a/docs/nomadSecretBackend.csharp.md +++ b/docs/nomadSecretBackend.csharp.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1179,7 +1179,7 @@ new NomadSecretBackendConfig { | DefaultLeaseTtlSeconds | double | Default lease duration for secrets in seconds. | | Description | string | Human-friendly description of the mount for the backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | Local | object | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | double | Maximum possible lease duration for secrets in seconds. | | MaxTokenNameLength | double | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1270,7 +1270,7 @@ public string Address { get; set; } Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1284,7 +1284,7 @@ public string Backend { get; set; } The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1298,7 +1298,7 @@ public string CaCert { get; set; } CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1312,7 +1312,7 @@ public string ClientCert { get; set; } Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1326,7 +1326,7 @@ public string ClientKey { get; set; } Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1340,7 +1340,7 @@ public double DefaultLeaseTtlSeconds { get; set; } Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1354,7 +1354,7 @@ public string Description { get; set; } Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1368,7 +1368,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1380,7 +1380,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1399,7 +1399,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1413,7 +1413,7 @@ public double MaxLeaseTtlSeconds { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1429,7 +1429,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1443,7 +1443,7 @@ public double MaxTtl { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1457,7 +1457,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1471,7 +1471,7 @@ public string Token { get; set; } Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1485,7 +1485,7 @@ public double Ttl { get; set; } Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.go.md b/docs/nomadSecretBackend.go.md index 2740c21d..6d7e8ece 100644 --- a/docs/nomadSecretBackend.go.md +++ b/docs/nomadSecretBackend.go.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1179,7 +1179,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretbackend" | DefaultLeaseTtlSeconds | *f64 | Default lease duration for secrets in seconds. | | Description | *string | Human-friendly description of the mount for the backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | Local | interface{} | Mark the secrets engine as local-only. | | MaxLeaseTtlSeconds | *f64 | Maximum possible lease duration for secrets in seconds. | | MaxTokenNameLength | *f64 | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1270,7 +1270,7 @@ Address *string Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1284,7 +1284,7 @@ Backend *string The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1298,7 +1298,7 @@ CaCert *string CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1312,7 +1312,7 @@ ClientCert *string Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1326,7 +1326,7 @@ ClientKey *string Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1340,7 +1340,7 @@ DefaultLeaseTtlSeconds *f64 Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1354,7 +1354,7 @@ Description *string Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1368,7 +1368,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1380,7 +1380,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1399,7 +1399,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1413,7 +1413,7 @@ MaxLeaseTtlSeconds *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1429,7 +1429,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1443,7 +1443,7 @@ MaxTtl *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1457,7 +1457,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1471,7 +1471,7 @@ Token *string Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1485,7 +1485,7 @@ Ttl *f64 Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.java.md b/docs/nomadSecretBackend.java.md index 9347187b..49902ca2 100644 --- a/docs/nomadSecretBackend.java.md +++ b/docs/nomadSecretBackend.java.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -63,7 +63,7 @@ NomadSecretBackend.Builder.create(Construct scope, java.lang.String id) | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | java.lang.Number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -210,7 +210,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -218,7 +218,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -233,7 +233,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -243,7 +243,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -255,7 +255,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -265,7 +265,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -275,7 +275,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -285,7 +285,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -295,7 +295,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- @@ -834,7 +834,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1440,7 +1440,7 @@ NomadSecretBackendConfig.builder() | defaultLeaseTtlSeconds | java.lang.Number | Default lease duration for secrets in seconds. | | description | java.lang.String | Human-friendly description of the mount for the backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | java.lang.Number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | java.lang.Number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1531,7 +1531,7 @@ public java.lang.String getAddress(); Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1545,7 +1545,7 @@ public java.lang.String getBackend(); The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1559,7 +1559,7 @@ public java.lang.String getCaCert(); CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1573,7 +1573,7 @@ public java.lang.String getClientCert(); Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1587,7 +1587,7 @@ public java.lang.String getClientKey(); Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1601,7 +1601,7 @@ public java.lang.Number getDefaultLeaseTtlSeconds(); Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1615,7 +1615,7 @@ public java.lang.String getDescription(); Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1629,7 +1629,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1641,7 +1641,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1660,7 +1660,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1674,7 +1674,7 @@ public java.lang.Number getMaxLeaseTtlSeconds(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1690,7 +1690,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1704,7 +1704,7 @@ public java.lang.Number getMaxTtl(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1718,7 +1718,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1732,7 +1732,7 @@ public java.lang.String getToken(); Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1746,7 +1746,7 @@ public java.lang.Number getTtl(); Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.python.md b/docs/nomadSecretBackend.python.md index d4577739..633d21d0 100644 --- a/docs/nomadSecretBackend.python.md +++ b/docs/nomadSecretBackend.python.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -59,7 +59,7 @@ nomadSecretBackend.NomadSecretBackend( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_token_name_length | typing.Union[int, float] | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -136,7 +136,7 @@ Must be unique amongst siblings in the same scope Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -156,7 +156,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -166,7 +166,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -176,7 +176,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -186,7 +186,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -196,7 +196,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -214,7 +214,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -229,7 +229,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -251,7 +251,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- @@ -876,7 +876,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1476,7 +1476,7 @@ nomadSecretBackend.NomadSecretBackendConfig( | default_lease_ttl_seconds | typing.Union[int, float] | Default lease duration for secrets in seconds. | | description | str | Human-friendly description of the mount for the backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | typing.Union[bool, cdktf.IResolvable] | Mark the secrets engine as local-only. | | max_lease_ttl_seconds | typing.Union[int, float] | Maximum possible lease duration for secrets in seconds. | | max_token_name_length | typing.Union[int, float] | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1567,7 +1567,7 @@ address: str Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1581,7 +1581,7 @@ backend: str The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1595,7 +1595,7 @@ ca_cert: str CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1609,7 +1609,7 @@ client_cert: str Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1623,7 +1623,7 @@ client_key: str Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1637,7 +1637,7 @@ default_lease_ttl_seconds: typing.Union[int, float] Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1651,7 +1651,7 @@ description: str Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1665,7 +1665,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1677,7 +1677,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1696,7 +1696,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1710,7 +1710,7 @@ max_lease_ttl_seconds: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1726,7 +1726,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1740,7 +1740,7 @@ max_ttl: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1754,7 +1754,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1768,7 +1768,7 @@ token: str Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1782,7 +1782,7 @@ ttl: typing.Union[int, float] Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretBackend.typescript.md b/docs/nomadSecretBackend.typescript.md index 67177f98..9e745aef 100644 --- a/docs/nomadSecretBackend.typescript.md +++ b/docs/nomadSecretBackend.typescript.md @@ -4,7 +4,7 @@ ### NomadSecretBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}. #### Initializers @@ -579,7 +579,7 @@ The construct id used in the generated config for the NomadSecretBackend to impo The id of the existing NomadSecretBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#import import section} in the documentation of this resource for the id to use --- @@ -1155,7 +1155,7 @@ const nomadSecretBackendConfig: nomadSecretBackend.NomadSecretBackendConfig = { | defaultLeaseTtlSeconds | number | Default lease duration for secrets in seconds. | | description | string | Human-friendly description of the mount for the backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. | | local | boolean \| cdktf.IResolvable | Mark the secrets engine as local-only. | | maxLeaseTtlSeconds | number | Maximum possible lease duration for secrets in seconds. | | maxTokenNameLength | number | Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. | @@ -1246,7 +1246,7 @@ public readonly address: string; Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} --- @@ -1260,7 +1260,7 @@ public readonly backend: string; The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} --- @@ -1274,7 +1274,7 @@ public readonly caCert: string; CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} --- @@ -1288,7 +1288,7 @@ public readonly clientCert: string; Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} --- @@ -1302,7 +1302,7 @@ public readonly clientKey: string; Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} --- @@ -1316,7 +1316,7 @@ public readonly defaultLeaseTtlSeconds: number; Default lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} --- @@ -1330,7 +1330,7 @@ public readonly description: string; Human-friendly description of the mount for the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} --- @@ -1344,7 +1344,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} --- @@ -1356,7 +1356,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1375,7 +1375,7 @@ Mark the secrets engine as local-only. Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} --- @@ -1389,7 +1389,7 @@ public readonly maxLeaseTtlSeconds: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} --- @@ -1405,7 +1405,7 @@ Specifies the maximum length to use for the name of the Nomad token generated wi If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} --- @@ -1419,7 +1419,7 @@ public readonly maxTtl: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} --- @@ -1433,7 +1433,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} --- @@ -1447,7 +1447,7 @@ public readonly token: string; Specifies the Nomad Management token to use. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} --- @@ -1461,7 +1461,7 @@ public readonly ttl: number; Maximum possible lease duration for secrets in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} --- diff --git a/docs/nomadSecretRole.csharp.md b/docs/nomadSecretRole.csharp.md index 565ab60b..a840e15b 100644 --- a/docs/nomadSecretRole.csharp.md +++ b/docs/nomadSecretRole.csharp.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ new NomadSecretRoleConfig { | Backend | string | The mount path for the Nomad backend. | | Role | string | Name of the role. | | Global | object | Specifies if the token should be global. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Comma separated list of Nomad policies the token is going to be created against. | | Type | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -977,7 +977,7 @@ public string Backend { get; set; } The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -991,7 +991,7 @@ public string Role { get; set; } Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1005,7 +1005,7 @@ public object Global { get; set; } Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1017,7 +1017,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1050,7 +1050,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1064,7 +1064,7 @@ public string Type { get; set; } Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.go.md b/docs/nomadSecretRole.go.md index 6f35bdfa..7afb8e0f 100644 --- a/docs/nomadSecretRole.go.md +++ b/docs/nomadSecretRole.go.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -890,7 +890,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/nomadsecretrole" | Backend | *string | The mount path for the Nomad backend. | | Role | *string | Name of the role. | | Global | interface{} | Specifies if the token should be global. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Comma separated list of Nomad policies the token is going to be created against. | | Type | *string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -977,7 +977,7 @@ Backend *string The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -991,7 +991,7 @@ Role *string Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1005,7 +1005,7 @@ Global interface{} Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1017,7 +1017,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1034,7 +1034,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1050,7 +1050,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1064,7 +1064,7 @@ Type *string Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.java.md b/docs/nomadSecretRole.java.md index e1b6f4c7..027cb790 100644 --- a/docs/nomadSecretRole.java.md +++ b/docs/nomadSecretRole.java.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -48,7 +48,7 @@ NomadSecretRole.Builder.create(Construct scope, java.lang.String id) | backend | java.lang.String | The mount path for the Nomad backend. | | role | java.lang.String | Name of the role. | | global | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the token should be global. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Comma separated list of Nomad policies the token is going to be created against. | | type | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -121,7 +121,7 @@ Must be unique amongst siblings in the same scope The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -131,7 +131,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -141,7 +141,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -149,7 +149,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -162,7 +162,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -174,7 +174,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -184,7 +184,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- @@ -646,7 +646,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1039,7 +1039,7 @@ NomadSecretRoleConfig.builder() | backend | java.lang.String | The mount path for the Nomad backend. | | role | java.lang.String | Name of the role. | | global | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Specifies if the token should be global. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Comma separated list of Nomad policies the token is going to be created against. | | type | java.lang.String | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -1126,7 +1126,7 @@ public java.lang.String getBackend(); The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -1140,7 +1140,7 @@ public java.lang.String getRole(); Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1154,7 +1154,7 @@ public java.lang.Object getGlobal(); Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1166,7 +1166,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1183,7 +1183,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1199,7 +1199,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1213,7 +1213,7 @@ public java.lang.String getType(); Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.python.md b/docs/nomadSecretRole.python.md index b8caa707..d2800320 100644 --- a/docs/nomadSecretRole.python.md +++ b/docs/nomadSecretRole.python.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -45,7 +45,7 @@ nomadSecretRole.NomadSecretRole( | backend | str | The mount path for the Nomad backend. | | role | str | Name of the role. | | global | typing.Union[bool, cdktf.IResolvable] | Specifies if the token should be global. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Comma separated list of Nomad policies the token is going to be created against. | | type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -171,7 +171,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -181,7 +181,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- @@ -689,7 +689,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -1077,7 +1077,7 @@ nomadSecretRole.NomadSecretRoleConfig( | backend | str | The mount path for the Nomad backend. | | role | str | Name of the role. | | global | typing.Union[bool, cdktf.IResolvable] | Specifies if the token should be global. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Comma separated list of Nomad policies the token is going to be created against. | | type | str | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -1164,7 +1164,7 @@ backend: str The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -1178,7 +1178,7 @@ role: str Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -1192,7 +1192,7 @@ global: typing.Union[bool, IResolvable] Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1204,7 +1204,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1221,7 +1221,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1237,7 +1237,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1251,7 +1251,7 @@ type: str Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/nomadSecretRole.typescript.md b/docs/nomadSecretRole.typescript.md index e07bcd5c..3dc5de49 100644 --- a/docs/nomadSecretRole.typescript.md +++ b/docs/nomadSecretRole.typescript.md @@ -4,7 +4,7 @@ ### NomadSecretRole -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role vault_nomad_secret_role}. #### Initializers @@ -502,7 +502,7 @@ The construct id used in the generated config for the NomadSecretRole to import. The id of the existing NomadSecretRole that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#import import section} in the documentation of this resource for the id to use --- @@ -875,7 +875,7 @@ const nomadSecretRoleConfig: nomadSecretRole.NomadSecretRoleConfig = { ... } | backend | string | The mount path for the Nomad backend. | | role | string | Name of the role. | | global | boolean \| cdktf.IResolvable | Specifies if the token should be global. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Comma separated list of Nomad policies the token is going to be created against. | | type | string | Specifies the type of token to create when using this role. Valid values are "client" or "management". | @@ -962,7 +962,7 @@ public readonly backend: string; The mount path for the Nomad backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#backend NomadSecretRole#backend} --- @@ -976,7 +976,7 @@ public readonly role: string; Name of the role. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#role NomadSecretRole#role} --- @@ -990,7 +990,7 @@ public readonly global: boolean | IResolvable; Specifies if the token should be global. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#global NomadSecretRole#global} --- @@ -1002,7 +1002,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#id NomadSecretRole#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1019,7 +1019,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#namespace NomadSecretRole#namespace} --- @@ -1035,7 +1035,7 @@ Comma separated list of Nomad policies the token is going to be created against. These need to be created beforehand in Nomad. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#policies NomadSecretRole#policies} --- @@ -1049,7 +1049,7 @@ public readonly type: string; Specifies the type of token to create when using this role. Valid values are "client" or "management". -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/nomad_secret_role#type NomadSecretRole#type} --- diff --git a/docs/oktaAuthBackend.csharp.md b/docs/oktaAuthBackend.csharp.md index 2ab080a0..dd867215 100644 --- a/docs/oktaAuthBackend.csharp.md +++ b/docs/oktaAuthBackend.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -640,7 +640,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1386,8 +1386,8 @@ new OktaAuthBackendConfig { | BypassOktaMfa | object | When true, requests by Okta for a MFA check will be bypassed. | | Description | string | The description of the auth backend. | | DisableRemount | object | If set, opts out of mount migration on path updates. | -| Group | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| Group | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | MaxTtl | string | Maximum duration after which authentication will be expired. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | path to mount the backend. | @@ -1402,7 +1402,7 @@ new OktaAuthBackendConfig { | TokenTtl | double | The initial ttl of the token to generate in seconds. | | TokenType | string | The type of token to generate, service or batch. | | Ttl | string | Duration after which authentication will be expired. | -| User | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| User | object | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1486,7 +1486,7 @@ public string Organization { get; set; } The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1500,7 +1500,7 @@ public string BaseUrl { get; set; } The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1516,7 +1516,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1530,7 +1530,7 @@ public string Description { get; set; } The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1544,7 +1544,7 @@ public object DisableRemount { get; set; } If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1556,7 +1556,7 @@ public object Group { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1568,7 +1568,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1585,7 +1585,7 @@ public string MaxTtl { get; set; } Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1599,7 +1599,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1613,7 +1613,7 @@ public string Path { get; set; } path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1629,7 +1629,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1643,7 +1643,7 @@ public string[] TokenBoundCidrs { get; set; } Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -1657,7 +1657,7 @@ public double TokenExplicitMaxTtl { get; set; } Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -1671,7 +1671,7 @@ public double TokenMaxTtl { get; set; } The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -1685,7 +1685,7 @@ public object TokenNoDefaultPolicy { get; set; } If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -1699,7 +1699,7 @@ public double TokenNumUses { get; set; } The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -1713,7 +1713,7 @@ public double TokenPeriod { get; set; } Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -1727,7 +1727,7 @@ public string[] TokenPolicies { get; set; } Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -1741,7 +1741,7 @@ public double TokenTtl { get; set; } The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -1755,7 +1755,7 @@ public string TokenType { get; set; } The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -1769,7 +1769,7 @@ public string Ttl { get; set; } Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1781,7 +1781,7 @@ public object User { get; set; } - *Type:* object -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1802,8 +1802,8 @@ new OktaAuthBackendGroup { | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| GroupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1815,7 +1815,7 @@ public string GroupName { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1827,7 +1827,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1849,9 +1849,9 @@ new OktaAuthBackendUser { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| Groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| Policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| Username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1863,7 +1863,7 @@ public string[] Groups { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1875,7 +1875,7 @@ public string[] Policies { get; set; } - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1887,7 +1887,7 @@ public string Username { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.go.md b/docs/oktaAuthBackend.go.md index d442f63e..95cb181d 100644 --- a/docs/oktaAuthBackend.go.md +++ b/docs/oktaAuthBackend.go.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -640,7 +640,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1386,8 +1386,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" | BypassOktaMfa | interface{} | When true, requests by Okta for a MFA check will be bypassed. | | Description | *string | The description of the auth backend. | | DisableRemount | interface{} | If set, opts out of mount migration on path updates. | -| Group | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| Group | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | MaxTtl | *string | Maximum duration after which authentication will be expired. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | path to mount the backend. | @@ -1402,7 +1402,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" | TokenTtl | *f64 | The initial ttl of the token to generate in seconds. | | TokenType | *string | The type of token to generate, service or batch. | | Ttl | *string | Duration after which authentication will be expired. | -| User | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| User | interface{} | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1486,7 +1486,7 @@ Organization *string The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1500,7 +1500,7 @@ BaseUrl *string The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1516,7 +1516,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1530,7 +1530,7 @@ Description *string The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1544,7 +1544,7 @@ DisableRemount interface{} If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1556,7 +1556,7 @@ Group interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1568,7 +1568,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1585,7 +1585,7 @@ MaxTtl *string Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1599,7 +1599,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1613,7 +1613,7 @@ Path *string path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1629,7 +1629,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1643,7 +1643,7 @@ TokenBoundCidrs *[]*string Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -1657,7 +1657,7 @@ TokenExplicitMaxTtl *f64 Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -1671,7 +1671,7 @@ TokenMaxTtl *f64 The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -1685,7 +1685,7 @@ TokenNoDefaultPolicy interface{} If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -1699,7 +1699,7 @@ TokenNumUses *f64 The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -1713,7 +1713,7 @@ TokenPeriod *f64 Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -1727,7 +1727,7 @@ TokenPolicies *[]*string Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -1741,7 +1741,7 @@ TokenTtl *f64 The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -1755,7 +1755,7 @@ TokenType *string The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -1769,7 +1769,7 @@ Ttl *string Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1781,7 +1781,7 @@ User interface{} - *Type:* interface{} -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1802,8 +1802,8 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| GroupName | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1815,7 +1815,7 @@ GroupName *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1827,7 +1827,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1849,9 +1849,9 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackend" | **Name** | **Type** | **Description** | | --- | --- | --- | -| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| Groups | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| Policies | *[]*string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| Username | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1863,7 +1863,7 @@ Groups *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1875,7 +1875,7 @@ Policies *[]*string - *Type:* *[]*string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1887,7 +1887,7 @@ Username *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.java.md b/docs/oktaAuthBackend.java.md index e66ca326..6fd30131 100644 --- a/docs/oktaAuthBackend.java.md +++ b/docs/oktaAuthBackend.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -69,8 +69,8 @@ OktaAuthBackend.Builder.create(Construct scope, java.lang.String id) | bypassOktaMfa | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | java.lang.String | Maximum duration after which authentication will be expired. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. | @@ -85,7 +85,7 @@ OktaAuthBackend.Builder.create(Construct scope, java.lang.String id) | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | | ttl | java.lang.String | Duration after which authentication will be expired. | -| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -155,7 +155,7 @@ Must be unique amongst siblings in the same scope The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -177,7 +177,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -187,7 +187,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -197,7 +197,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -226,7 +226,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -258,7 +258,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -268,7 +268,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -278,7 +278,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -288,7 +288,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -298,7 +298,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -308,7 +308,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -318,7 +318,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -328,7 +328,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -338,7 +338,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -348,7 +348,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -358,7 +358,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -366,7 +366,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -966,7 +966,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1721,8 +1721,8 @@ OktaAuthBackendConfig.builder() | bypassOktaMfa | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | java.lang.String | The description of the auth backend. | | disableRemount | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | java.lang.String | Maximum duration after which authentication will be expired. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | path to mount the backend. | @@ -1737,7 +1737,7 @@ OktaAuthBackendConfig.builder() | tokenTtl | java.lang.Number | The initial ttl of the token to generate in seconds. | | tokenType | java.lang.String | The type of token to generate, service or batch. | | ttl | java.lang.String | Duration after which authentication will be expired. | -| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1821,7 +1821,7 @@ public java.lang.String getOrganization(); The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1835,7 +1835,7 @@ public java.lang.String getBaseUrl(); The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1851,7 +1851,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1865,7 +1865,7 @@ public java.lang.String getDescription(); The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1879,7 +1879,7 @@ public java.lang.Object getDisableRemount(); If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1891,7 +1891,7 @@ public java.lang.Object getGroup(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendGroup> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1903,7 +1903,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1920,7 +1920,7 @@ public java.lang.String getMaxTtl(); Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1934,7 +1934,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1948,7 +1948,7 @@ public java.lang.String getPath(); path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1964,7 +1964,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1978,7 +1978,7 @@ public java.util.List getTokenBoundCidrs(); Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -1992,7 +1992,7 @@ public java.lang.Number getTokenExplicitMaxTtl(); Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -2006,7 +2006,7 @@ public java.lang.Number getTokenMaxTtl(); The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -2020,7 +2020,7 @@ public java.lang.Object getTokenNoDefaultPolicy(); If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -2034,7 +2034,7 @@ public java.lang.Number getTokenNumUses(); The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -2048,7 +2048,7 @@ public java.lang.Number getTokenPeriod(); Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -2062,7 +2062,7 @@ public java.util.List getTokenPolicies(); Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -2076,7 +2076,7 @@ public java.lang.Number getTokenTtl(); The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -2090,7 +2090,7 @@ public java.lang.String getTokenType(); The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -2104,7 +2104,7 @@ public java.lang.String getTtl(); Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -2116,7 +2116,7 @@ public java.lang.Object getUser(); - *Type:* com.hashicorp.cdktf.IResolvable OR java.util.List<OktaAuthBackendUser> -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -2137,8 +2137,8 @@ OktaAuthBackendGroup.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| groupName | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -2150,7 +2150,7 @@ public java.lang.String getGroupName(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -2162,7 +2162,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -2184,9 +2184,9 @@ OktaAuthBackendUser.builder() | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | java.util.List | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -2198,7 +2198,7 @@ public java.util.List getGroups(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -2210,7 +2210,7 @@ public java.util.List getPolicies(); - *Type:* java.util.List -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -2222,7 +2222,7 @@ public java.lang.String getUsername(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.python.md b/docs/oktaAuthBackend.python.md index 22adff54..1d55fea4 100644 --- a/docs/oktaAuthBackend.python.md +++ b/docs/oktaAuthBackend.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -62,8 +62,8 @@ oktaAuthBackend.OktaAuthBackend( | bypass_okta_mfa | typing.Union[bool, cdktf.IResolvable] | When true, requests by Okta for a MFA check will be bypassed. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | max_ttl | str | Maximum duration after which authentication will be expired. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. | @@ -78,7 +78,7 @@ oktaAuthBackend.OktaAuthBackend( | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | | ttl | str | Duration after which authentication will be expired. | -| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -148,7 +148,7 @@ Must be unique amongst siblings in the same scope The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -158,7 +158,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -170,7 +170,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -198,7 +198,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -206,7 +206,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -219,7 +219,7 @@ If you experience problems setting this value it might not be settable. Please t Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -229,7 +229,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -239,7 +239,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -251,7 +251,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -321,7 +321,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -331,7 +331,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -341,7 +341,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -351,7 +351,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -359,7 +359,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1009,7 +1009,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1755,8 +1755,8 @@ oktaAuthBackend.OktaAuthBackendConfig( | bypass_okta_mfa | typing.Union[bool, cdktf.IResolvable] | When true, requests by Okta for a MFA check will be bypassed. | | description | str | The description of the auth backend. | | disable_remount | typing.Union[bool, cdktf.IResolvable] | If set, opts out of mount migration on path updates. | -| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | max_ttl | str | Maximum duration after which authentication will be expired. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | path to mount the backend. | @@ -1771,7 +1771,7 @@ oktaAuthBackend.OktaAuthBackendConfig( | token_ttl | typing.Union[int, float] | The initial ttl of the token to generate in seconds. | | token_type | str | The type of token to generate, service or batch. | | ttl | str | Duration after which authentication will be expired. | -| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1855,7 +1855,7 @@ organization: str The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1869,7 +1869,7 @@ base_url: str The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1885,7 +1885,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1899,7 +1899,7 @@ description: str The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1913,7 +1913,7 @@ disable_remount: typing.Union[bool, IResolvable] If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1925,7 +1925,7 @@ group: typing.Union[IResolvable, typing.List[OktaAuthBackendGroup]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendGroup]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1937,7 +1937,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1954,7 +1954,7 @@ max_ttl: str Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1968,7 +1968,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1982,7 +1982,7 @@ path: str path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1998,7 +1998,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -2012,7 +2012,7 @@ token_bound_cidrs: typing.List[str] Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -2026,7 +2026,7 @@ token_explicit_max_ttl: typing.Union[int, float] Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -2040,7 +2040,7 @@ token_max_ttl: typing.Union[int, float] The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -2054,7 +2054,7 @@ token_no_default_policy: typing.Union[bool, IResolvable] If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -2068,7 +2068,7 @@ token_num_uses: typing.Union[int, float] The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -2082,7 +2082,7 @@ token_period: typing.Union[int, float] Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -2096,7 +2096,7 @@ token_policies: typing.List[str] Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -2110,7 +2110,7 @@ token_ttl: typing.Union[int, float] The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -2124,7 +2124,7 @@ token_type: str The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -2138,7 +2138,7 @@ ttl: str Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -2150,7 +2150,7 @@ user: typing.Union[IResolvable, typing.List[OktaAuthBackendUser]] - *Type:* typing.Union[cdktf.IResolvable, typing.List[OktaAuthBackendUser]] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -2171,8 +2171,8 @@ oktaAuthBackend.OktaAuthBackendGroup( | **Name** | **Type** | **Description** | | --- | --- | --- | -| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| group_name | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -2184,7 +2184,7 @@ group_name: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -2196,7 +2196,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -2218,9 +2218,9 @@ oktaAuthBackend.OktaAuthBackendUser( | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | typing.List[str] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -2232,7 +2232,7 @@ groups: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -2244,7 +2244,7 @@ policies: typing.List[str] - *Type:* typing.List[str] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -2256,7 +2256,7 @@ username: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackend.typescript.md b/docs/oktaAuthBackend.typescript.md index fff7be01..de6dbcdd 100644 --- a/docs/oktaAuthBackend.typescript.md +++ b/docs/oktaAuthBackend.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackend -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend vault_okta_auth_backend}. #### Initializers @@ -640,7 +640,7 @@ The construct id used in the generated config for the OktaAuthBackend to import. The id of the existing OktaAuthBackend that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#import import section} in the documentation of this resource for the id to use --- @@ -1356,8 +1356,8 @@ const oktaAuthBackendConfig: oktaAuthBackend.OktaAuthBackendConfig = { ... } | bypassOktaMfa | boolean \| cdktf.IResolvable | When true, requests by Okta for a MFA check will be bypassed. | | description | string | The description of the auth backend. | | disableRemount | boolean \| cdktf.IResolvable | If set, opts out of mount migration on path updates. | -| group | cdktf.IResolvable \| OktaAuthBackendGroup[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | +| group | cdktf.IResolvable \| OktaAuthBackendGroup[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. | | maxTtl | string | Maximum duration after which authentication will be expired. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | path to mount the backend. | @@ -1372,7 +1372,7 @@ const oktaAuthBackendConfig: oktaAuthBackend.OktaAuthBackendConfig = { ... } | tokenTtl | number | The initial ttl of the token to generate in seconds. | | tokenType | string | The type of token to generate, service or batch. | | ttl | string | Duration after which authentication will be expired. | -| user | cdktf.IResolvable \| OktaAuthBackendUser[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | +| user | cdktf.IResolvable \| OktaAuthBackendUser[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. | --- @@ -1456,7 +1456,7 @@ public readonly organization: string; The Okta organization. This will be the first part of the url https://XXX.okta.com. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#organization OktaAuthBackend#organization} --- @@ -1470,7 +1470,7 @@ public readonly baseUrl: string; The Okta url. Examples: oktapreview.com, okta.com (default). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#base_url OktaAuthBackend#base_url} --- @@ -1486,7 +1486,7 @@ When true, requests by Okta for a MFA check will be bypassed. This also disallows certain status checks on the account, such as whether the password is expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#bypass_okta_mfa OktaAuthBackend#bypass_okta_mfa} --- @@ -1500,7 +1500,7 @@ public readonly description: string; The description of the auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#description OktaAuthBackend#description} --- @@ -1514,7 +1514,7 @@ public readonly disableRemount: boolean | IResolvable; If set, opts out of mount migration on path updates. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#disable_remount OktaAuthBackend#disable_remount} --- @@ -1526,7 +1526,7 @@ public readonly group: IResolvable | OktaAuthBackendGroup[]; - *Type:* cdktf.IResolvable | OktaAuthBackendGroup[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group OktaAuthBackend#group}. --- @@ -1538,7 +1538,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#id OktaAuthBackend#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1555,7 +1555,7 @@ public readonly maxTtl: string; Maximum duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#max_ttl OktaAuthBackend#max_ttl} --- @@ -1569,7 +1569,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#namespace OktaAuthBackend#namespace} --- @@ -1583,7 +1583,7 @@ public readonly path: string; path to mount the backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#path OktaAuthBackend#path} --- @@ -1599,7 +1599,7 @@ The Okta API token. This is required to query Okta for user group membership. If this is not supplied only locally configured groups will be enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token OktaAuthBackend#token} --- @@ -1613,7 +1613,7 @@ public readonly tokenBoundCidrs: string[]; Specifies the blocks of IP addresses which are allowed to use the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_bound_cidrs OktaAuthBackend#token_bound_cidrs} --- @@ -1627,7 +1627,7 @@ public readonly tokenExplicitMaxTtl: number; Generated Token's Explicit Maximum TTL in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_explicit_max_ttl OktaAuthBackend#token_explicit_max_ttl} --- @@ -1641,7 +1641,7 @@ public readonly tokenMaxTtl: number; The maximum lifetime of the generated token. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_max_ttl OktaAuthBackend#token_max_ttl} --- @@ -1655,7 +1655,7 @@ public readonly tokenNoDefaultPolicy: boolean | IResolvable; If true, the 'default' policy will not automatically be added to generated tokens. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_no_default_policy OktaAuthBackend#token_no_default_policy} --- @@ -1669,7 +1669,7 @@ public readonly tokenNumUses: number; The maximum number of times a token may be used, a value of zero means unlimited. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_num_uses OktaAuthBackend#token_num_uses} --- @@ -1683,7 +1683,7 @@ public readonly tokenPeriod: number; Generated Token's Period. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_period OktaAuthBackend#token_period} --- @@ -1697,7 +1697,7 @@ public readonly tokenPolicies: string[]; Generated Token's Policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_policies OktaAuthBackend#token_policies} --- @@ -1711,7 +1711,7 @@ public readonly tokenTtl: number; The initial ttl of the token to generate in seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_ttl OktaAuthBackend#token_ttl} --- @@ -1725,7 +1725,7 @@ public readonly tokenType: string; The type of token to generate, service or batch. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#token_type OktaAuthBackend#token_type} --- @@ -1739,7 +1739,7 @@ public readonly ttl: string; Duration after which authentication will be expired. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#ttl OktaAuthBackend#ttl} --- @@ -1751,7 +1751,7 @@ public readonly user: IResolvable | OktaAuthBackendUser[]; - *Type:* cdktf.IResolvable | OktaAuthBackendUser[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#user OktaAuthBackend#user}. --- @@ -1769,8 +1769,8 @@ const oktaAuthBackendGroup: oktaAuthBackend.OktaAuthBackendGroup = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| groupName | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | --- @@ -1782,7 +1782,7 @@ public readonly groupName: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#group_name OktaAuthBackend#group_name}. --- @@ -1794,7 +1794,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1812,9 +1812,9 @@ const oktaAuthBackendUser: oktaAuthBackend.OktaAuthBackendUser = { ... } | **Name** | **Type** | **Description** | | --- | --- | --- | -| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | -| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | -| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | +| groups | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. | +| policies | string[] | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. | +| username | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. | --- @@ -1826,7 +1826,7 @@ public readonly groups: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#groups OktaAuthBackend#groups}. --- @@ -1838,7 +1838,7 @@ public readonly policies: string[]; - *Type:* string[] -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#policies OktaAuthBackend#policies}. --- @@ -1850,7 +1850,7 @@ public readonly username: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend#username OktaAuthBackend#username}. --- diff --git a/docs/oktaAuthBackendGroup.csharp.md b/docs/oktaAuthBackendGroup.csharp.md index 7dd88500..90aed491 100644 --- a/docs/oktaAuthBackendGroup.csharp.md +++ b/docs/oktaAuthBackendGroup.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -829,7 +829,7 @@ new OktaAuthBackendGroupAConfig { | Provisioners | object[] | *No description.* | | GroupName | string | Name of the Okta group. | | Path | string | Path to the Okta auth backend. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to associate with this group. | @@ -915,7 +915,7 @@ public string GroupName { get; set; } Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -929,7 +929,7 @@ public string Path { get; set; } Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -941,7 +941,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -972,7 +972,7 @@ public string[] Policies { get; set; } Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.go.md b/docs/oktaAuthBackendGroup.go.md index 0377b913..7f606869 100644 --- a/docs/oktaAuthBackendGroup.go.md +++ b/docs/oktaAuthBackendGroup.go.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -829,7 +829,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackendgroup" | Provisioners | *[]interface{} | *No description.* | | GroupName | *string | Name of the Okta group. | | Path | *string | Path to the Okta auth backend. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to associate with this group. | @@ -915,7 +915,7 @@ GroupName *string Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -929,7 +929,7 @@ Path *string Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -941,7 +941,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -958,7 +958,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -972,7 +972,7 @@ Policies *[]*string Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.java.md b/docs/oktaAuthBackendGroup.java.md index 50e5c93b..11cd66a4 100644 --- a/docs/oktaAuthBackendGroup.java.md +++ b/docs/oktaAuthBackendGroup.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -44,7 +44,7 @@ OktaAuthBackendGroupA.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | groupName | java.lang.String | Name of the Okta group. | | path | java.lang.String | Path to the Okta auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this group. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- @@ -605,7 +605,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -950,7 +950,7 @@ OktaAuthBackendGroupAConfig.builder() | provisioners | java.util.List | *No description.* | | groupName | java.lang.String | Name of the Okta group. | | path | java.lang.String | Path to the Okta auth backend. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this group. | @@ -1036,7 +1036,7 @@ public java.lang.String getGroupName(); Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -1050,7 +1050,7 @@ public java.lang.String getPath(); Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -1062,7 +1062,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1079,7 +1079,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -1093,7 +1093,7 @@ public java.util.List getPolicies(); Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.python.md b/docs/oktaAuthBackendGroup.python.md index 7170f96c..e7a9f10f 100644 --- a/docs/oktaAuthBackendGroup.python.md +++ b/docs/oktaAuthBackendGroup.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -42,7 +42,7 @@ oktaAuthBackendGroup.OktaAuthBackendGroupA( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_name | str | Name of the Okta group. | | path | str | Path to the Okta auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this group. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- @@ -649,7 +649,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -990,7 +990,7 @@ oktaAuthBackendGroup.OktaAuthBackendGroupAConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | group_name | str | Name of the Okta group. | | path | str | Path to the Okta auth backend. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this group. | @@ -1076,7 +1076,7 @@ group_name: str Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -1090,7 +1090,7 @@ path: str Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -1102,7 +1102,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1119,7 +1119,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -1133,7 +1133,7 @@ policies: typing.List[str] Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendGroup.typescript.md b/docs/oktaAuthBackendGroup.typescript.md index 8010a711..e295a27c 100644 --- a/docs/oktaAuthBackendGroup.typescript.md +++ b/docs/oktaAuthBackendGroup.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackendGroupA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group vault_okta_auth_backend_group}. #### Initializers @@ -488,7 +488,7 @@ The construct id used in the generated config for the OktaAuthBackendGroupA to i The id of the existing OktaAuthBackendGroupA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#import import section} in the documentation of this resource for the id to use --- @@ -816,7 +816,7 @@ const oktaAuthBackendGroupAConfig: oktaAuthBackendGroup.OktaAuthBackendGroupACon | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | groupName | string | Name of the Okta group. | | path | string | Path to the Okta auth backend. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to associate with this group. | @@ -902,7 +902,7 @@ public readonly groupName: string; Name of the Okta group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#group_name OktaAuthBackendGroupA#group_name} --- @@ -916,7 +916,7 @@ public readonly path: string; Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#path OktaAuthBackendGroupA#path} --- @@ -928,7 +928,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#id OktaAuthBackendGroupA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -945,7 +945,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#namespace OktaAuthBackendGroupA#namespace} --- @@ -959,7 +959,7 @@ public readonly policies: string[]; Policies to associate with this group. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_group#policies OktaAuthBackendGroupA#policies} --- diff --git a/docs/oktaAuthBackendUser.csharp.md b/docs/oktaAuthBackendUser.csharp.md index e006c3c4..3627ee99 100644 --- a/docs/oktaAuthBackendUser.csharp.md +++ b/docs/oktaAuthBackendUser.csharp.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ new OktaAuthBackendUserAConfig { | Path | string | Path to the Okta auth backend. | | Username | string | Name of the user within Okta. | | Groups | string[] | Groups within the Okta auth backend to associate with this user. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Policies | string[] | Policies to associate with this user. | @@ -946,7 +946,7 @@ public string Path { get; set; } Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -960,7 +960,7 @@ public string Username { get; set; } Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -974,7 +974,7 @@ public string[] Groups { get; set; } Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -986,7 +986,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1017,7 +1017,7 @@ public string[] Policies { get; set; } Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.go.md b/docs/oktaAuthBackendUser.go.md index a72847d0..5028c4ee 100644 --- a/docs/oktaAuthBackendUser.go.md +++ b/docs/oktaAuthBackendUser.go.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -860,7 +860,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/oktaauthbackenduser" | Path | *string | Path to the Okta auth backend. | | Username | *string | Name of the user within Okta. | | Groups | *[]*string | Groups within the Okta auth backend to associate with this user. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Policies | *[]*string | Policies to associate with this user. | @@ -946,7 +946,7 @@ Path *string Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -960,7 +960,7 @@ Username *string Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -974,7 +974,7 @@ Groups *[]*string Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -986,7 +986,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1003,7 +1003,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1017,7 +1017,7 @@ Policies *[]*string Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.java.md b/docs/oktaAuthBackendUser.java.md index 9b38aff8..4e741d6c 100644 --- a/docs/oktaAuthBackendUser.java.md +++ b/docs/oktaAuthBackendUser.java.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -46,7 +46,7 @@ OktaAuthBackendUserA.Builder.create(Construct scope, java.lang.String id) | path | java.lang.String | Path to the Okta auth backend. | | username | java.lang.String | Name of the user within Okta. | | groups | java.util.List | Groups within the Okta auth backend to associate with this user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this user. | @@ -118,7 +118,7 @@ Must be unique amongst siblings in the same scope Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -128,7 +128,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -138,7 +138,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -146,7 +146,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -159,7 +159,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -169,7 +169,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- @@ -624,7 +624,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -993,7 +993,7 @@ OktaAuthBackendUserAConfig.builder() | path | java.lang.String | Path to the Okta auth backend. | | username | java.lang.String | Name of the user within Okta. | | groups | java.util.List | Groups within the Okta auth backend to associate with this user. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | policies | java.util.List | Policies to associate with this user. | @@ -1079,7 +1079,7 @@ public java.lang.String getPath(); Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -1093,7 +1093,7 @@ public java.lang.String getUsername(); Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -1107,7 +1107,7 @@ public java.util.List getGroups(); Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -1119,7 +1119,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1136,7 +1136,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1150,7 +1150,7 @@ public java.util.List getPolicies(); Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.python.md b/docs/oktaAuthBackendUser.python.md index ab38788d..dd6a9f4e 100644 --- a/docs/oktaAuthBackendUser.python.md +++ b/docs/oktaAuthBackendUser.python.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -44,7 +44,7 @@ oktaAuthBackendUser.OktaAuthBackendUserA( | path | str | Path to the Okta auth backend. | | username | str | Name of the user within Okta. | | groups | typing.List[str] | Groups within the Okta auth backend to associate with this user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this user. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -136,7 +136,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -144,7 +144,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -157,7 +157,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -167,7 +167,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- @@ -668,7 +668,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -1033,7 +1033,7 @@ oktaAuthBackendUser.OktaAuthBackendUserAConfig( | path | str | Path to the Okta auth backend. | | username | str | Name of the user within Okta. | | groups | typing.List[str] | Groups within the Okta auth backend to associate with this user. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | str | Target namespace. (requires Enterprise). | | policies | typing.List[str] | Policies to associate with this user. | @@ -1119,7 +1119,7 @@ path: str Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -1133,7 +1133,7 @@ username: str Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -1147,7 +1147,7 @@ groups: typing.List[str] Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -1159,7 +1159,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1176,7 +1176,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1190,7 +1190,7 @@ policies: typing.List[str] Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/oktaAuthBackendUser.typescript.md b/docs/oktaAuthBackendUser.typescript.md index fff93342..1d0344bd 100644 --- a/docs/oktaAuthBackendUser.typescript.md +++ b/docs/oktaAuthBackendUser.typescript.md @@ -4,7 +4,7 @@ ### OktaAuthBackendUserA -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user vault_okta_auth_backend_user}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the OktaAuthBackendUserA to im The id of the existing OktaAuthBackendUserA that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#import import section} in the documentation of this resource for the id to use --- @@ -846,7 +846,7 @@ const oktaAuthBackendUserAConfig: oktaAuthBackendUser.OktaAuthBackendUserAConfig | path | string | Path to the Okta auth backend. | | username | string | Name of the user within Okta. | | groups | string[] | Groups within the Okta auth backend to associate with this user. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. | | namespace | string | Target namespace. (requires Enterprise). | | policies | string[] | Policies to associate with this user. | @@ -932,7 +932,7 @@ public readonly path: string; Path to the Okta auth backend. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#path OktaAuthBackendUserA#path} --- @@ -946,7 +946,7 @@ public readonly username: string; Name of the user within Okta. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#username OktaAuthBackendUserA#username} --- @@ -960,7 +960,7 @@ public readonly groups: string[]; Groups within the Okta auth backend to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#groups OktaAuthBackendUserA#groups} --- @@ -972,7 +972,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#id OktaAuthBackendUserA#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -989,7 +989,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#namespace OktaAuthBackendUserA#namespace} --- @@ -1003,7 +1003,7 @@ public readonly policies: string[]; Policies to associate with this user. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/okta_auth_backend_user#policies OktaAuthBackendUserA#policies} --- diff --git a/docs/passwordPolicy.csharp.md b/docs/passwordPolicy.csharp.md index affc73a4..fc16966d 100644 --- a/docs/passwordPolicy.csharp.md +++ b/docs/passwordPolicy.csharp.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new PasswordPolicyConfig { | Provisioners | object[] | *No description.* | | Name | string | Name of the password policy. | | Policy | string | The password policy document. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Name { get; set; } Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -898,7 +898,7 @@ public string Policy { get; set; } The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.go.md b/docs/passwordPolicy.go.md index 32b1db00..ad077295 100644 --- a/docs/passwordPolicy.go.md +++ b/docs/passwordPolicy.go.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/passwordpolicy" | Provisioners | *[]interface{} | *No description.* | | Name | *string | Name of the password policy. | | Policy | *string | The password policy document. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Name *string Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -898,7 +898,7 @@ Policy *string The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.java.md b/docs/passwordPolicy.java.md index 7a90c2a6..282b0575 100644 --- a/docs/passwordPolicy.java.md +++ b/docs/passwordPolicy.java.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -43,7 +43,7 @@ PasswordPolicy.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the password policy. | | policy | java.lang.String | The password policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ PasswordPolicyConfig.builder() | provisioners | java.util.List | *No description.* | | name | java.lang.String | Name of the password policy. | | policy | java.lang.String | The password policy document. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getName(); Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -1007,7 +1007,7 @@ public java.lang.String getPolicy(); The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.python.md b/docs/passwordPolicy.python.md index d2f7cd8c..ca8ed370 100644 --- a/docs/passwordPolicy.python.md +++ b/docs/passwordPolicy.python.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -41,7 +41,7 @@ passwordPolicy.PasswordPolicy( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the password policy. | | policy | str | The password policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ passwordPolicy.PasswordPolicyConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | name | str | Name of the password policy. | | policy | str | The password policy document. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ name: str Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -1047,7 +1047,7 @@ policy: str The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/passwordPolicy.typescript.md b/docs/passwordPolicy.typescript.md index 94d4d7db..790f373c 100644 --- a/docs/passwordPolicy.typescript.md +++ b/docs/passwordPolicy.typescript.md @@ -4,7 +4,7 @@ ### PasswordPolicy -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy vault_password_policy}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy vault_password_policy}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PasswordPolicy to import. The id of the existing PasswordPolicy that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const passwordPolicyConfig: passwordPolicy.PasswordPolicyConfig = { ... } | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | name | string | Name of the password policy. | | policy | string | The password policy document. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly name: string; Name of the password policy. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#name PasswordPolicy#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#name PasswordPolicy#name} --- @@ -886,7 +886,7 @@ public readonly policy: string; The password policy document. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#policy PasswordPolicy#policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#policy PasswordPolicy#policy} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#id PasswordPolicy#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#id PasswordPolicy#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/password_policy#namespace PasswordPolicy#namespace} --- diff --git a/docs/pkiSecretBackendCert.csharp.md b/docs/pkiSecretBackendCert.csharp.md index 19931e27..dd345e82 100644 --- a/docs/pkiSecretBackendCert.csharp.md +++ b/docs/pkiSecretBackendCert.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1305,7 +1305,7 @@ new PkiSecretBackendCertConfig { | AutoRenew | object | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | object | Flag to exclude CN from SANs. | | Format | string | The format of data. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | IpSans | string[] | List of alternative IPs. | | IssuerRef | string | Specifies the default issuer of this request. | | MinSecondsRemaining | double | Generate a new certificate when the expiration is within this number of seconds. | @@ -1399,7 +1399,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1413,7 +1413,7 @@ public string CommonName { get; set; } CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1427,7 +1427,7 @@ public string Name { get; set; } Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1441,7 +1441,7 @@ public string[] AltNames { get; set; } List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1455,7 +1455,7 @@ public object AutoRenew { get; set; } If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1469,7 +1469,7 @@ public object ExcludeCnFromSans { get; set; } Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1483,7 +1483,7 @@ public string Format { get; set; } The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1495,7 +1495,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ public string[] IpSans { get; set; } List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1526,7 +1526,7 @@ public string IssuerRef { get; set; } Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1540,7 +1540,7 @@ public double MinSecondsRemaining { get; set; } Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1554,7 +1554,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1568,7 +1568,7 @@ public string[] OtherSans { get; set; } List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1582,7 +1582,7 @@ public string PrivateKeyFormat { get; set; } The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1596,7 +1596,7 @@ public object Revoke { get; set; } Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1610,7 +1610,7 @@ public string Ttl { get; set; } Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1624,7 +1624,7 @@ public string[] UriSans { get; set; } List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1638,7 +1638,7 @@ public string[] UserIds { get; set; } List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.go.md b/docs/pkiSecretBackendCert.go.md index 5d83474b..4f9fae80 100644 --- a/docs/pkiSecretBackendCert.go.md +++ b/docs/pkiSecretBackendCert.go.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1305,7 +1305,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendcert" | AutoRenew | interface{} | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | ExcludeCnFromSans | interface{} | Flag to exclude CN from SANs. | | Format | *string | The format of data. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | IpSans | *[]*string | List of alternative IPs. | | IssuerRef | *string | Specifies the default issuer of this request. | | MinSecondsRemaining | *f64 | Generate a new certificate when the expiration is within this number of seconds. | @@ -1399,7 +1399,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1413,7 +1413,7 @@ CommonName *string CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1427,7 +1427,7 @@ Name *string Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1441,7 +1441,7 @@ AltNames *[]*string List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1455,7 +1455,7 @@ AutoRenew interface{} If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1469,7 +1469,7 @@ ExcludeCnFromSans interface{} Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1483,7 +1483,7 @@ Format *string The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1495,7 +1495,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1512,7 +1512,7 @@ IpSans *[]*string List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1526,7 +1526,7 @@ IssuerRef *string Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1540,7 +1540,7 @@ MinSecondsRemaining *f64 Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1554,7 +1554,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1568,7 +1568,7 @@ OtherSans *[]*string List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1582,7 +1582,7 @@ PrivateKeyFormat *string The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1596,7 +1596,7 @@ Revoke interface{} Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1610,7 +1610,7 @@ Ttl *string Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1624,7 +1624,7 @@ UriSans *[]*string List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1638,7 +1638,7 @@ UserIds *[]*string List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.java.md b/docs/pkiSecretBackendCert.java.md index 50a8cbdc..4f77ba4e 100644 --- a/docs/pkiSecretBackendCert.java.md +++ b/docs/pkiSecretBackendCert.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -65,7 +65,7 @@ PkiSecretBackendCert.Builder.create(Construct scope, java.lang.String id) | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -145,7 +145,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -165,7 +165,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -175,7 +175,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -185,7 +185,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -195,7 +195,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -205,7 +205,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -213,7 +213,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -226,7 +226,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -236,7 +236,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -246,7 +246,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -256,7 +256,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -266,7 +266,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -276,7 +276,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -286,7 +286,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -296,7 +296,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -306,7 +306,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -316,7 +316,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- @@ -848,7 +848,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1588,7 +1588,7 @@ PkiSecretBackendCertConfig.builder() | autoRenew | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | java.lang.Boolean OR com.hashicorp.cdktf.IResolvable | Flag to exclude CN from SANs. | | format | java.lang.String | The format of data. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | java.util.List | List of alternative IPs. | | issuerRef | java.lang.String | Specifies the default issuer of this request. | | minSecondsRemaining | java.lang.Number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1682,7 +1682,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1696,7 +1696,7 @@ public java.lang.String getCommonName(); CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1710,7 +1710,7 @@ public java.lang.String getName(); Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1724,7 +1724,7 @@ public java.util.List getAltNames(); List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1738,7 +1738,7 @@ public java.lang.Object getAutoRenew(); If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1752,7 +1752,7 @@ public java.lang.Object getExcludeCnFromSans(); Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1766,7 +1766,7 @@ public java.lang.String getFormat(); The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1778,7 +1778,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1795,7 +1795,7 @@ public java.util.List getIpSans(); List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1809,7 +1809,7 @@ public java.lang.String getIssuerRef(); Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1823,7 +1823,7 @@ public java.lang.Number getMinSecondsRemaining(); Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1837,7 +1837,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1851,7 +1851,7 @@ public java.util.List getOtherSans(); List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1865,7 +1865,7 @@ public java.lang.String getPrivateKeyFormat(); The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1879,7 +1879,7 @@ public java.lang.Object getRevoke(); Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1893,7 +1893,7 @@ public java.lang.String getTtl(); Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1907,7 +1907,7 @@ public java.util.List getUriSans(); List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1921,7 +1921,7 @@ public java.util.List getUserIds(); List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.python.md b/docs/pkiSecretBackendCert.python.md index 8eb2fb58..c39b4d7a 100644 --- a/docs/pkiSecretBackendCert.python.md +++ b/docs/pkiSecretBackendCert.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -60,7 +60,7 @@ pkiSecretBackendCert.PkiSecretBackendCert( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -140,7 +140,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -150,7 +150,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -160,7 +160,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -170,7 +170,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -180,7 +180,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -190,7 +190,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -200,7 +200,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -208,7 +208,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -221,7 +221,7 @@ If you experience problems setting this value it might not be settable. Please t List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -231,7 +231,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -241,7 +241,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -251,7 +251,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -261,7 +261,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -271,7 +271,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -281,7 +281,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -291,7 +291,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -301,7 +301,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -311,7 +311,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- @@ -889,7 +889,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1622,7 +1622,7 @@ pkiSecretBackendCert.PkiSecretBackendCertConfig( | auto_renew | typing.Union[bool, cdktf.IResolvable] | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | exclude_cn_from_sans | typing.Union[bool, cdktf.IResolvable] | Flag to exclude CN from SANs. | | format | str | The format of data. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ip_sans | typing.List[str] | List of alternative IPs. | | issuer_ref | str | Specifies the default issuer of this request. | | min_seconds_remaining | typing.Union[int, float] | Generate a new certificate when the expiration is within this number of seconds. | @@ -1716,7 +1716,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1730,7 +1730,7 @@ common_name: str CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1744,7 +1744,7 @@ name: str Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1758,7 +1758,7 @@ alt_names: typing.List[str] List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1772,7 +1772,7 @@ auto_renew: typing.Union[bool, IResolvable] If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1786,7 +1786,7 @@ exclude_cn_from_sans: typing.Union[bool, IResolvable] Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1800,7 +1800,7 @@ format: str The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1812,7 +1812,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1829,7 +1829,7 @@ ip_sans: typing.List[str] List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1843,7 +1843,7 @@ issuer_ref: str Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1857,7 +1857,7 @@ min_seconds_remaining: typing.Union[int, float] Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1871,7 +1871,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1885,7 +1885,7 @@ other_sans: typing.List[str] List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1899,7 +1899,7 @@ private_key_format: str The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1913,7 +1913,7 @@ revoke: typing.Union[bool, IResolvable] Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1927,7 +1927,7 @@ ttl: str Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1941,7 +1941,7 @@ uri_sans: typing.List[str] List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1955,7 +1955,7 @@ user_ids: typing.List[str] List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendCert.typescript.md b/docs/pkiSecretBackendCert.typescript.md index 2c8a4799..141d6d9e 100644 --- a/docs/pkiSecretBackendCert.typescript.md +++ b/docs/pkiSecretBackendCert.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendCert -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert vault_pki_secret_backend_cert}. #### Initializers @@ -572,7 +572,7 @@ The construct id used in the generated config for the PkiSecretBackendCert to im The id of the existing PkiSecretBackendCert that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#import import section} in the documentation of this resource for the id to use --- @@ -1279,7 +1279,7 @@ const pkiSecretBackendCertConfig: pkiSecretBackendCert.PkiSecretBackendCertConfi | autoRenew | boolean \| cdktf.IResolvable | If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. | | excludeCnFromSans | boolean \| cdktf.IResolvable | Flag to exclude CN from SANs. | | format | string | The format of data. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. | | ipSans | string[] | List of alternative IPs. | | issuerRef | string | Specifies the default issuer of this request. | | minSecondsRemaining | number | Generate a new certificate when the expiration is within this number of seconds. | @@ -1373,7 +1373,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#backend PkiSecretBackendCert#backend} --- @@ -1387,7 +1387,7 @@ public readonly commonName: string; CN of the certificate to create. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#common_name PkiSecretBackendCert#common_name} --- @@ -1401,7 +1401,7 @@ public readonly name: string; Name of the role to create the certificate against. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#name PkiSecretBackendCert#name} --- @@ -1415,7 +1415,7 @@ public readonly altNames: string[]; List of alternative names. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#alt_names PkiSecretBackendCert#alt_names} --- @@ -1429,7 +1429,7 @@ public readonly autoRenew: boolean | IResolvable; If enabled, a new certificate will be generated if the expiration is within min_seconds_remaining. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#auto_renew PkiSecretBackendCert#auto_renew} --- @@ -1443,7 +1443,7 @@ public readonly excludeCnFromSans: boolean | IResolvable; Flag to exclude CN from SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#exclude_cn_from_sans PkiSecretBackendCert#exclude_cn_from_sans} --- @@ -1457,7 +1457,7 @@ public readonly format: string; The format of data. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#format PkiSecretBackendCert#format} --- @@ -1469,7 +1469,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#id PkiSecretBackendCert#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1486,7 +1486,7 @@ public readonly ipSans: string[]; List of alternative IPs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ip_sans PkiSecretBackendCert#ip_sans} --- @@ -1500,7 +1500,7 @@ public readonly issuerRef: string; Specifies the default issuer of this request. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#issuer_ref PkiSecretBackendCert#issuer_ref} --- @@ -1514,7 +1514,7 @@ public readonly minSecondsRemaining: number; Generate a new certificate when the expiration is within this number of seconds. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#min_seconds_remaining PkiSecretBackendCert#min_seconds_remaining} --- @@ -1528,7 +1528,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#namespace PkiSecretBackendCert#namespace} --- @@ -1542,7 +1542,7 @@ public readonly otherSans: string[]; List of other SANs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#other_sans PkiSecretBackendCert#other_sans} --- @@ -1556,7 +1556,7 @@ public readonly privateKeyFormat: string; The private key format. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#private_key_format PkiSecretBackendCert#private_key_format} --- @@ -1570,7 +1570,7 @@ public readonly revoke: boolean | IResolvable; Revoke the certificate upon resource destruction. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#revoke PkiSecretBackendCert#revoke} --- @@ -1584,7 +1584,7 @@ public readonly ttl: string; Time to live. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#ttl PkiSecretBackendCert#ttl} --- @@ -1598,7 +1598,7 @@ public readonly uriSans: string[]; List of alternative URIs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#uri_sans PkiSecretBackendCert#uri_sans} --- @@ -1612,7 +1612,7 @@ public readonly userIds: string[]; List of Subject User IDs. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_cert#user_ids PkiSecretBackendCert#user_ids} --- diff --git a/docs/pkiSecretBackendConfigCa.csharp.md b/docs/pkiSecretBackendConfigCa.csharp.md index caad5a61..d373f61c 100644 --- a/docs/pkiSecretBackendConfigCa.csharp.md +++ b/docs/pkiSecretBackendConfigCa.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ new PkiSecretBackendConfigCaConfig { | Provisioners | object[] | *No description.* | | Backend | string | The PKI secret backend the resource belongs to. | | PemBundle | string | The key and certificate PEM bundle. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | Namespace | string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -898,7 +898,7 @@ public string PemBundle { get; set; } The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -910,7 +910,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.go.md b/docs/pkiSecretBackendConfigCa.go.md index 0501e721..01bb0a13 100644 --- a/docs/pkiSecretBackendConfigCa.go.md +++ b/docs/pkiSecretBackendConfigCa.go.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -799,7 +799,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfi | Provisioners | *[]interface{} | *No description.* | | Backend | *string | The PKI secret backend the resource belongs to. | | PemBundle | *string | The key and certificate PEM bundle. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | --- @@ -884,7 +884,7 @@ Backend *string The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -898,7 +898,7 @@ PemBundle *string The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -910,7 +910,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -927,7 +927,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.java.md b/docs/pkiSecretBackendConfigCa.java.md index 6c6ed34b..5abdd8a9 100644 --- a/docs/pkiSecretBackendConfigCa.java.md +++ b/docs/pkiSecretBackendConfigCa.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -43,7 +43,7 @@ PkiSecretBackendConfigCa.Builder.create(Construct scope, java.lang.String id) | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | pemBundle | java.lang.String | The key and certificate PEM bundle. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- @@ -586,7 +586,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -908,7 +908,7 @@ PkiSecretBackendConfigCaConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | The PKI secret backend the resource belongs to. | | pemBundle | java.lang.String | The key and certificate PEM bundle. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | --- @@ -993,7 +993,7 @@ public java.lang.String getBackend(); The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -1007,7 +1007,7 @@ public java.lang.String getPemBundle(); The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -1019,7 +1019,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1036,7 +1036,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.python.md b/docs/pkiSecretBackendConfigCa.python.md index 70da1e64..bb368a63 100644 --- a/docs/pkiSecretBackendConfigCa.python.md +++ b/docs/pkiSecretBackendConfigCa.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -41,7 +41,7 @@ pkiSecretBackendConfigCa.PkiSecretBackendConfigCa( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | pem_bundle | str | The key and certificate PEM bundle. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -112,7 +112,7 @@ Must be unique amongst siblings in the same scope The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -122,7 +122,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -130,7 +130,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -143,7 +143,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- @@ -630,7 +630,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -948,7 +948,7 @@ pkiSecretBackendConfigCa.PkiSecretBackendConfigCaConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | The PKI secret backend the resource belongs to. | | pem_bundle | str | The key and certificate PEM bundle. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | str | Target namespace. (requires Enterprise). | --- @@ -1033,7 +1033,7 @@ backend: str The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -1047,7 +1047,7 @@ pem_bundle: str The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -1059,7 +1059,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1076,7 +1076,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCa.typescript.md b/docs/pkiSecretBackendConfigCa.typescript.md index 08b3d4da..48795018 100644 --- a/docs/pkiSecretBackendConfigCa.typescript.md +++ b/docs/pkiSecretBackendConfigCa.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCa -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca vault_pki_secret_backend_config_ca}. #### Initializers @@ -481,7 +481,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigCa t The id of the existing PkiSecretBackendConfigCa that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#import import section} in the documentation of this resource for the id to use --- @@ -787,7 +787,7 @@ const pkiSecretBackendConfigCaConfig: pkiSecretBackendConfigCa.PkiSecretBackendC | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | The PKI secret backend the resource belongs to. | | pemBundle | string | The key and certificate PEM bundle. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. | | namespace | string | Target namespace. (requires Enterprise). | --- @@ -872,7 +872,7 @@ public readonly backend: string; The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#backend PkiSecretBackendConfigCa#backend} --- @@ -886,7 +886,7 @@ public readonly pemBundle: string; The key and certificate PEM bundle. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#pem_bundle PkiSecretBackendConfigCa#pem_bundle} --- @@ -898,7 +898,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#id PkiSecretBackendConfigCa#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -915,7 +915,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_ca#namespace PkiSecretBackendConfigCa#namespace} --- diff --git a/docs/pkiSecretBackendConfigCluster.csharp.md b/docs/pkiSecretBackendConfigCluster.csharp.md index 9874ec99..bd3da299 100644 --- a/docs/pkiSecretBackendConfigCluster.csharp.md +++ b/docs/pkiSecretBackendConfigCluster.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCluster -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigClus The id of the existing PkiSecretBackendConfigCluster that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ new PkiSecretBackendConfigClusterConfig { | Provisioners | object[] | *No description.* | | Backend | string | Full path where PKI backend is mounted. | | AiaPath | string | Path to the cluster's AIA distribution point. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | Namespace | string | Target namespace. (requires Enterprise). | | Path | string | Path to the cluster's API mount path. | @@ -922,7 +922,7 @@ public string Backend { get; set; } Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -936,7 +936,7 @@ public string AiaPath { get; set; } Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -948,7 +948,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ public string Namespace { get; set; } Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -979,7 +979,7 @@ public string Path { get; set; } Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- diff --git a/docs/pkiSecretBackendConfigCluster.go.md b/docs/pkiSecretBackendConfigCluster.go.md index b71f225d..5b0d7fc9 100644 --- a/docs/pkiSecretBackendConfigCluster.go.md +++ b/docs/pkiSecretBackendConfigCluster.go.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCluster -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigClus The id of the existing PkiSecretBackendConfigCluster that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use --- @@ -836,7 +836,7 @@ import "github.com/cdktf/cdktf-provider-vault-go/vault/v13/pkisecretbackendconfi | Provisioners | *[]interface{} | *No description.* | | Backend | *string | Full path where PKI backend is mounted. | | AiaPath | *string | Path to the cluster's AIA distribution point. | -| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| Id | *string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | Namespace | *string | Target namespace. (requires Enterprise). | | Path | *string | Path to the cluster's API mount path. | @@ -922,7 +922,7 @@ Backend *string Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -936,7 +936,7 @@ AiaPath *string Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -948,7 +948,7 @@ Id *string - *Type:* *string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -965,7 +965,7 @@ Namespace *string Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -979,7 +979,7 @@ Path *string Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- diff --git a/docs/pkiSecretBackendConfigCluster.java.md b/docs/pkiSecretBackendConfigCluster.java.md index 7d3b8ad7..eb77579f 100644 --- a/docs/pkiSecretBackendConfigCluster.java.md +++ b/docs/pkiSecretBackendConfigCluster.java.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCluster -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. #### Initializers @@ -44,7 +44,7 @@ PkiSecretBackendConfigCluster.Builder.create(Construct scope, java.lang.String i | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | aiaPath | java.lang.String | Path to the cluster's AIA distribution point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path to the cluster's API mount path. | @@ -116,7 +116,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -126,7 +126,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -134,7 +134,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -147,7 +147,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -157,7 +157,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- @@ -612,7 +612,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigClus The id of the existing PkiSecretBackendConfigCluster that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use --- @@ -957,7 +957,7 @@ PkiSecretBackendConfigClusterConfig.builder() | provisioners | java.util.List | *No description.* | | backend | java.lang.String | Full path where PKI backend is mounted. | | aiaPath | java.lang.String | Path to the cluster's AIA distribution point. | -| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| id | java.lang.String | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | namespace | java.lang.String | Target namespace. (requires Enterprise). | | path | java.lang.String | Path to the cluster's API mount path. | @@ -1043,7 +1043,7 @@ public java.lang.String getBackend(); Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -1057,7 +1057,7 @@ public java.lang.String getAiaPath(); Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -1069,7 +1069,7 @@ public java.lang.String getId(); - *Type:* java.lang.String -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1086,7 +1086,7 @@ public java.lang.String getNamespace(); Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -1100,7 +1100,7 @@ public java.lang.String getPath(); Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- diff --git a/docs/pkiSecretBackendConfigCluster.python.md b/docs/pkiSecretBackendConfigCluster.python.md index 8192b6b4..977cd1cb 100644 --- a/docs/pkiSecretBackendConfigCluster.python.md +++ b/docs/pkiSecretBackendConfigCluster.python.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCluster -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. #### Initializers @@ -42,7 +42,7 @@ pkiSecretBackendConfigCluster.PkiSecretBackendConfigCluster( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | aia_path | str | Path to the cluster's AIA distribution point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path to the cluster's API mount path. | @@ -114,7 +114,7 @@ Must be unique amongst siblings in the same scope Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -124,7 +124,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -132,7 +132,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -145,7 +145,7 @@ If you experience problems setting this value it might not be settable. Please t Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -155,7 +155,7 @@ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashi Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- @@ -656,7 +656,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigClus The id of the existing PkiSecretBackendConfigCluster that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use --- @@ -997,7 +997,7 @@ pkiSecretBackendConfigCluster.PkiSecretBackendConfigClusterConfig( | provisioners | typing.List[typing.Union[cdktf.FileProvisioner, cdktf.LocalExecProvisioner, cdktf.RemoteExecProvisioner]] | *No description.* | | backend | str | Full path where PKI backend is mounted. | | aia_path | str | Path to the cluster's AIA distribution point. | -| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| id | str | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | namespace | str | Target namespace. (requires Enterprise). | | path | str | Path to the cluster's API mount path. | @@ -1083,7 +1083,7 @@ backend: str Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -1097,7 +1097,7 @@ aia_path: str Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -1109,7 +1109,7 @@ id: str - *Type:* str -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1126,7 +1126,7 @@ namespace: str Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -1140,7 +1140,7 @@ path: str Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- diff --git a/docs/pkiSecretBackendConfigCluster.typescript.md b/docs/pkiSecretBackendConfigCluster.typescript.md index 7c47d971..3aa4538e 100644 --- a/docs/pkiSecretBackendConfigCluster.typescript.md +++ b/docs/pkiSecretBackendConfigCluster.typescript.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigCluster -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster vault_pki_secret_backend_config_cluster}. #### Initializers @@ -495,7 +495,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigClus The id of the existing PkiSecretBackendConfigCluster that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#import import section} in the documentation of this resource for the id to use --- @@ -823,7 +823,7 @@ const pkiSecretBackendConfigClusterConfig: pkiSecretBackendConfigCluster.PkiSecr | provisioners | cdktf.FileProvisioner \| cdktf.LocalExecProvisioner \| cdktf.RemoteExecProvisioner[] | *No description.* | | backend | string | Full path where PKI backend is mounted. | | aiaPath | string | Path to the cluster's AIA distribution point. | -| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | +| id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. | | namespace | string | Target namespace. (requires Enterprise). | | path | string | Path to the cluster's API mount path. | @@ -909,7 +909,7 @@ public readonly backend: string; Full path where PKI backend is mounted. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#backend PkiSecretBackendConfigCluster#backend} --- @@ -923,7 +923,7 @@ public readonly aiaPath: string; Path to the cluster's AIA distribution point. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#aia_path PkiSecretBackendConfigCluster#aia_path} --- @@ -935,7 +935,7 @@ public readonly id: string; - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#id PkiSecretBackendConfigCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -952,7 +952,7 @@ public readonly namespace: string; Target namespace. (requires Enterprise). -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#namespace PkiSecretBackendConfigCluster#namespace} --- @@ -966,7 +966,7 @@ public readonly path: string; Path to the cluster's API mount path. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_cluster#path PkiSecretBackendConfigCluster#path} --- diff --git a/docs/pkiSecretBackendConfigEst.csharp.md b/docs/pkiSecretBackendConfigEst.csharp.md index 34019ef1..3e4479db 100644 --- a/docs/pkiSecretBackendConfigEst.csharp.md +++ b/docs/pkiSecretBackendConfigEst.csharp.md @@ -4,7 +4,7 @@ ### PkiSecretBackendConfigEst -Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. +Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est vault_pki_secret_backend_config_est}. #### Initializers @@ -543,7 +543,7 @@ The construct id used in the generated config for the PkiSecretBackendConfigEst The id of the existing PkiSecretBackendConfigEst that should be imported. -Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use +Refer to the {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#import import section} in the documentation of this resource for the id to use --- @@ -986,8 +986,8 @@ new PkiSecretBackendConfigEstAuthenticators { | **Name** | **Type** | **Description** | | --- | --- | --- | -| Cert | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#cert PkiSecretBackendConfigEst#cert}. | -| Userpass | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#userpass PkiSecretBackendConfigEst#userpass}. | +| Cert | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#cert PkiSecretBackendConfigEst#cert}. | +| Userpass | System.Collections.Generic.IDictionary | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#userpass PkiSecretBackendConfigEst#userpass}. | --- @@ -999,7 +999,7 @@ public System.Collections.Generic.IDictionary Cert { get; set; } - *Type:* System.Collections.Generic.IDictionary -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#cert PkiSecretBackendConfigEst#cert}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#cert PkiSecretBackendConfigEst#cert}. --- @@ -1011,7 +1011,7 @@ public System.Collections.Generic.IDictionary Userpass { get; se - *Type:* System.Collections.Generic.IDictionary -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#userpass PkiSecretBackendConfigEst#userpass}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#userpass PkiSecretBackendConfigEst#userpass}. --- @@ -1061,7 +1061,7 @@ new PkiSecretBackendConfigEstConfig { | DefaultPathPolicy | string | Required to be set if default_mount is enabled. | | Enabled | object | Specifies whether EST is enabled. | | EnableSentinelParsing | object | If set, parse out fields from the provided CSR making them available for Sentinel policies. | -| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#id PkiSecretBackendConfigEst#id}. | +| Id | string | Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#id PkiSecretBackendConfigEst#id}. | | LabelToPathPolicy | System.Collections.Generic.IDictionary | Configures a pairing of an EST label with the redirected behavior for requests hitting that role. | | Namespace | string | Target namespace. (requires Enterprise). | @@ -1147,7 +1147,7 @@ public string Backend { get; set; } The PKI secret backend the resource belongs to. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#backend PkiSecretBackendConfigEst#backend} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#backend PkiSecretBackendConfigEst#backend} --- @@ -1161,7 +1161,7 @@ public string[] AuditFields { get; set; } Fields parsed from the CSR that appear in the audit and can be used by sentinel policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#audit_fields PkiSecretBackendConfigEst#audit_fields} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#audit_fields PkiSecretBackendConfigEst#audit_fields} --- @@ -1175,7 +1175,7 @@ public PkiSecretBackendConfigEstAuthenticators Authenticators { get; set; } authenticators block. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#authenticators PkiSecretBackendConfigEst#authenticators} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#authenticators PkiSecretBackendConfigEst#authenticators} --- @@ -1189,7 +1189,7 @@ public object DefaultMount { get; set; } If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#default_mount PkiSecretBackendConfigEst#default_mount} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#default_mount PkiSecretBackendConfigEst#default_mount} --- @@ -1205,7 +1205,7 @@ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role: -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#default_path_policy PkiSecretBackendConfigEst#default_path_policy} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#default_path_policy PkiSecretBackendConfigEst#default_path_policy} --- @@ -1219,7 +1219,7 @@ public object Enabled { get; set; } Specifies whether EST is enabled. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#enabled PkiSecretBackendConfigEst#enabled} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#enabled PkiSecretBackendConfigEst#enabled} --- @@ -1233,7 +1233,7 @@ public object EnableSentinelParsing { get; set; } If set, parse out fields from the provided CSR making them available for Sentinel policies. -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#enable_sentinel_parsing PkiSecretBackendConfigEst#enable_sentinel_parsing} +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#enable_sentinel_parsing PkiSecretBackendConfigEst#enable_sentinel_parsing} --- @@ -1245,7 +1245,7 @@ public string Id { get; set; } - *Type:* string -Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.4.0/docs/resources/pki_secret_backend_config_est#id PkiSecretBackendConfigEst#id}. +Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/4.5.0/docs/resources/pki_secret_backend_config_est#id PkiSecretBackendConfigEst#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -1264,7 +1264,7 @@ Configures a pairing of an EST label with the redirected behavior for requests h The path policy can be sign-verbatim or a role given by role:. Labels must be unique across Vault cluster, and will register .well-known/est/